Censys has a new SaaS platform! Learn More about our attack surface management platform.

Menu

Ready to Get
Started?

Request a Demo or

Sally Feller

New MySQL-Related Default Insecurity Affects 7500+ Apps

by Sally Feller · August 21st, 2019
A new MySQL-related default setting can cause some real headaches/insecurities. We wanted to quickly assess just how many hosts were affected by this issue so that our Enterprise customers could find insecure SphinxSearch hosts they own, including those that are in use within their organization.

New! Search Censys for Prometheus Endpoints

by Sally Feller · August 20th, 2019
Now you can easily search for exposed Prometheus endpoints in our IPv4 data set. Since these applications can lead to data loss if not properly secured, it’s important to find any that are still are the Internet that you and your team are no longer using so you’re not opening your organization up to unnecessary risk. We’ll walk you through how to find them in this article.

New Protocol: Find Exposed Kubernetes Components

by Sally Feller · August 13th, 2019
We’ve recently added a new protocol to our data set: Kubernetes. Now users can find all Kubernetes components exposed on the Internet. Since these open-source devops tools are often misconfigured, they are often targeted by attackers who want access into an organization.

Announcing Our Attack Surface Management Platform

by Sally Feller · August 5th, 2019
We’re excited to announce that our new enterprise security platform is in limited, closed beta! We plan to make Censys Platform, our first SaaS product, available to everyone in Fall 2019. Get more details and find out how Censys can help you get full visibility into your attack surface and monitor, track, and remediate threats to protect your organization.

Censys at Black Hat USA 2019

by Sally Feller · July 23rd, 2019
It’s our first year at Black Hat as an exhibitor and we can’t wait to see you all! Stop by our booth for a personalized demo of your attack surface, where we may find assets and infrastructure you weren’t aware were being used in your organization.

Around 9700 Microsoft Exchange Servers Affected by Privilege Escalation Vulnerability

by Sally Feller · July 17th, 2019
A new Microsoft Exchange Server CVE was recently reported that allows for an attacker to access email mailboxes of any user, if exploited. We’ll show you the results of our search for affected servers and provide a quick tutorial for how threat hunters and pentesters on how to use our data to find vulnerabilities.

A Chat with Our Amazing Interns

by Sally Feller · July 11th, 2019
Meet Ricky and Ben, the two interns we knew we needed on our team this summer at Censys. We wanted to get their feedback so far on working on the team and also highlight their work here so far.

Discover Your Potentially Vulnerable SMB Servers

by Sally Feller · June 12th, 2019
Censys recently added massive amounts of new Internet scan data about SMB ports. SMB is a good example of low-hanging fruit for attackers, because it’s a protocol used across many services and has a lengthy history of insecure configurations or implementation bugs.

Around 1600 Sharepoint Servers Vulnerable to Attack

by Sally Feller · May 21st, 2019
A new security vulnerability leaves about 1600 Sharepoint servers open to attack. Explore how we tracked this CVE and see if your organization is affected.

Prevent Unnecessary Risk from pcAnywhere

by Sally Feller · May 21st, 2019
pcAnywhere is an insecure remote access application, but your employees may be using it without your knowledge. Find those instances in Censys and then provide employees with secure remote access alternatives so they can work remotely.

How to Make Sure Your Elasticsearch Databases Aren’t Exposed

by Sally Feller · May 7th, 2019
Most organizations that use Elasticsearch databases use it to store business and customer information. It’s popular for web applications because it allows for easy ingestion and search, making powerful applications easy to develop. Use Censys to find out if your company is properly securing Elasticsearch databases.

Now Available: Maltego Integration for Censys Users

by Sally Feller · April 18th, 2019
We’re excited to announce that Censys users can now take advantage of the incredible power of Maltego’s visualization tools to help enrich and understand their assets. Using Censys with Maltego makes it easier for you to visualize vulnerabilities and complex relationships between digital assets.

Hunting for Threats: Coinhive Cryptocurrency Miner

by Sally Feller · April 10th, 2019
In this article, we’ll teach you how to think like threat hunters and use the open source tool YARA alongside Censys to find Coinhive, a cryptocurrency miner service.

Update ASAP: Apache HTTP Web Server Patch Fixes Critical Security Issue

by Sally Feller · April 3rd, 2019
Apache HTTP Web Server users should update their servers immediately to prevent critical security flaws for cloud and shared web hosting providers. Use Censys to find the Apache HTTP Web Servers your organization is using, even the ones you didn’t already know about, that are actually connected to the Internet, potentially vulnerable, and require patching.

New Whitepaper: Why Internet Data Should be Part of Your Security Strategy

by Sally Feller · April 2nd, 2019
In our latest whitepaper, we walk through how to use Internet security data within your organization to find what you didn’t know you had and secure it. Internet security data provides comprehensive visibility into your business’ infrastructure, including all the hosts and servers outside your traditional managed network.

Ready to Get Started?

Get a real-time view of all your organization's assets so you can proactively prevent threats.