Apache HTTP Web Server users should update their servers immediately to prevent critical security flaws for cloud and shared web hosting providers. Use Censys to find the Apache HTTP Web Servers your organization is using, even the ones you didn’t already know about, that are actually connected to the Internet, potentially vulnerable, and require patching.
In our latest whitepaper, we walk through how to use Internet security data within your organization to find what you didn’t know you had and secure it. Internet security data provides comprehensive visibility into your business’ infrastructure, including all the hosts and servers outside your traditional managed network.
Censys indexes TLS certificates associated with hosts and services and also tracks a few specific vulnerabilities, which means you can use it to find outdated, insecure devices and certificates in your organization. We’ll take you through a few of those searches, related to TLS.
Censys now performs broad, lightweight scans on over 1,000 TCP/IP services and publishes a daily snapshot that includes the certificates and banners found on each host.
We recently added MQ Telemetry Transport (MQTT) and the Advanced Message Queuing Protocol (AMQP) protocols to our data set. Here’s a quick rundown of what these protocols are used for, what security risks they carry with them, how to search for servers and devices that use MQTT and AMQP, and how to secure those servers.
FTP sites can act as easy gateways for attackers to get into business systems, due to common misuse and misconfiguration issues. In this article, we show you how to use FTP banner grabs to find unknown and/or unsecured business FTP sites. Once located, we’ll walk you through steps for securing them or, better yet, moving to SaaS file-sharing offerings with security tools built-in.
In this article, we’ll show you one way to find hacked web servers. There are endless methods of hunting for affected web servers and this is just one example to get you started in thinking about your efforts in this area.
Building Automation and Control network (BACnet) is one of the most popular SCADA protocols that building automation and control systems use to operate. Censys searches for five of the most popular SCADA protocol (including Modbus, S7, BACnet, DNP3, Tridium Fox) and a quick search shows that there are 16,899 BACnet servers accessible across the Internet.
The Mirai Botnet made much of the Internet inaccessible for the US East Coast back in late 2016, taking advantage of insecure IoT devices. Malware similar to Mirai in both behavior and structure is still very much in use across the Internet today. We set out find the servers that host it using Censys.
There was a time before widespread adoption of the Internet when communities of local Bulletin Board Systems (BBSes) ruled the day in all their ANSI-colored text-based glory. Some BBSes are still active in 2019 and you can find them in Censys. To the nostalgia machine…
Defend your organization before phishing campaigns are even launched by finding adversary pre-attack infrastructure. In this post, we provide a few tips for finding fraudulent domains in Censys.
As CWMP is one of most common protocol across the Internet, we explored the security of the protocol and what kind of risks it poses. Moreover, are there any real risks for the corporate world or is this just a consumer technology problem?
We recently started scanning for IPMI devices in Censys so that administrators can search for them and prioritize migrating them to a private network.
Magecart was the malware behind the British Airways and Ticketmaster data breaches a few years back and, unfortunately, it’s still alive and well. Here's how to hunt for Magecart using Censys.
We added data for remote desktop protocol (RDP) and virtual network computing (VNC) to Censys. Now you can search for any RDP or VNC servers that are online and tied to your organization and ensure that they’re locked down appropriately.