<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-15T09:11:47Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by GreyNoise</title>
  <author>
    <name>GreyNoise</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1lmdgglk68ys6e75ycxxrv2rufxs49hm5rxh23473f5rrgeucvm9qaum9t8.rss" />
  <link href="https://yabu.me/npub1lmdgglk68ys6e75ycxxrv2rufxs49hm5rxh23473f5rrgeucvm9qaum9t8" />
  <id>https://yabu.me/npub1lmdgglk68ys6e75ycxxrv2rufxs49hm5rxh23473f5rrgeucvm9qaum9t8</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/287/162/176/762/744/original/03f75c5756bc3459.png</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/287/162/176/762/744/original/03f75c5756bc3459.png</logo>




  <entry>
    <id>https://yabu.me/nevent1qqswhezzan4q5409544l7279aq9z97nawtfqr6eqcpux6dnwhm7ykrqzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5y2u837</id>
    
      <title type="html">We observed a 65% drop in global telnet traffic in a single hour ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswhezzan4q5409544l7279aq9z97nawtfqr6eqcpux6dnwhm7ykrqzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5y2u837" />
    <content type="html">
      We observed a 65% drop in global telnet traffic in a single hour on Jan 14, settling into a sustained 59% reduction. 18 ASNs went silent, 5 countries disappeared, but cloud providers were unaffected.&lt;br/&gt;&lt;br/&gt;Our analysis of 51.2M sessions points to backbone-level port 23 filtering by a North American Tier 1 transit provider.&lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/&#34;&gt;https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#GreyNoise #ThreatIntel #CyberSecurity #InfoSec
    </content>
    <updated>2026-02-10T20:42:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9umpnwjjnwa7q5ntyqszeskhev6ua9kedjs3hw2r3gdn2zf8w20qzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5009vqf</id>
    
      <title type="html">🚨 Palo Alto GlobalProtect scanning surged 40X in 24hrs...a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9umpnwjjnwa7q5ntyqszeskhev6ua9kedjs3hw2r3gdn2zf8w20qzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5009vqf" />
    <content type="html">
      🚨 Palo Alto GlobalProtect scanning surged 40X in 24hrs...a 90-day high.&lt;br/&gt;2.3M login attempts from concentrated infrastructure (AS200373/AS208885).&lt;br/&gt;Block these IPs now: &lt;a href=&#34;https://www.greynoise.io/blog/palo-alto-scanning-surges-90-day-high&#34;&gt;https://www.greynoise.io/blog/palo-alto-scanning-surges-90-day-high&lt;/a&gt;
    </content>
    <updated>2025-11-19T21:04:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp67vfaxmav2xu7hnd4gxlg3ulm6x09yhpzfrz2madw77uc3h876szyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv59sedu7</id>
    
      <title type="html">EU sanctioned Stark Industries in May. Leaked docs gave them 12 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp67vfaxmav2xu7hnd4gxlg3ulm6x09yhpzfrz2madw77uc3h876szyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv59sedu7" />
    <content type="html">
      EU sanctioned Stark Industries in May. Leaked docs gave them 12 days warning.&lt;br/&gt;&lt;br/&gt;Result: ASN shuffle, rebrand to THE.Hosting. Corporate shells changed, network behavior didn&amp;#39;t.&lt;br/&gt;&lt;br/&gt;We tracked it: AS44477→AS209847. Packets don&amp;#39;t lie. &lt;br/&gt;🔗 &lt;a href=&#34;https://www.greynoise.io/blog/stark-industries-shell-game&#34;&gt;https://www.greynoise.io/blog/stark-industries-shell-game&lt;/a&gt;
    </content>
    <updated>2025-11-17T20:56:56Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9afszp6k8yzdftt020yrcdddfvqmy88xtnjhu7vlwqkx89pfpy6czyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5ne4h8u</id>
    
      <title type="html">GreyNoise now has coverage for Cisco zero-days CVE-2025-20333 and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9afszp6k8yzdftt020yrcdddfvqmy88xtnjhu7vlwqkx89pfpy6czyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5ne4h8u" />
    <content type="html">
      GreyNoise now has coverage for Cisco zero-days CVE-2025-20333 and CVE-2025-20362. Watch for exploit attempts in real-time:CVE-2025-20333 &lt;br/&gt;(Net-new): &lt;a href=&#34;https://viz.greynoise.io/tags/cisco-asa-vpn-input-validation-cve-2025-20333-rce-attempt?days=1CVE-2025-20362&#34;&gt;https://viz.greynoise.io/tags/cisco-asa-vpn-input-validation-cve-2025-20333-rce-attempt?days=1CVE-2025-20362&lt;/a&gt; &lt;br/&gt;(Updated tag): &lt;a href=&#34;https://viz.greynoise.io/tags/cisco-asa-directory-traversal-cve-2018-0296-and-cve-2025-20362-attempt&#34;&gt;https://viz.greynoise.io/tags/cisco-asa-directory-traversal-cve-2018-0296-and-cve-2025-20362-attempt&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#CiscoASA #Cisco #ZeroDay #CiscoZeroDays #CVE202520333 #CVE202520362 #GreyNoise #ThreatIntel
    </content>
    <updated>2025-10-01T22:03:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg8eh2d779lrj93sxq06uvc2f2uhfgg868jpguqszgwf8ak9fu09gzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5ywrf8s</id>
    
      <title type="html">On August 21, GreyNoise observed nearly 2,000 malicious IPs ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg8eh2d779lrj93sxq06uvc2f2uhfgg868jpguqszgwf8ak9fu09gzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5ywrf8s" />
    <content type="html">
      On August 21, GreyNoise observed nearly 2,000 malicious IPs probing Microsoft Remote Desktop (RDP) services in a single day — a sharp deviation from baseline activity. Full blog: &lt;a href=&#34;https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop&#34;&gt;https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#ThreatIntel #RDP #Cybersecurity #GreyNoise #Analysis #RemoteDesktop&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/090/941/432/782/395/original/a498b25dbf6f7c24.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-08-25T19:00:06Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdzj6zhmlld5qm6pntmfdnpcnxzg3ly6xe97r6fy0wqvj77h6q70czyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5eamwh3</id>
    
      <title type="html">Two critical Ivanti zero-days (CVE-2025-4427 &#43; CVE-2025-4428) are ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdzj6zhmlld5qm6pntmfdnpcnxzg3ly6xe97r6fy0wqvj77h6q70czyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5eamwh3" />
    <content type="html">
      Two critical Ivanti zero-days (CVE-2025-4427 &#43; CVE-2025-4428) are now being actively exploited after a surge in scanning activity last month. Immediate patching is required. Get more details here ⬇️ &lt;a href=&#34;https://www.greynoise.io/blog/ivanti-epmm-zero-days-reconnaissance-exploitation&#34;&gt;https://www.greynoise.io/blog/ivanti-epmm-zero-days-reconnaissance-exploitation&lt;/a&gt; &lt;br/&gt;#ZeroDay #CyberSecurity #threatintel&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/518/471/220/723/020/original/c3b5c5b4674c1b28.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-05-16T16:33:19Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsygedzuptwrezpjlz397ehke596hta8krs76q72vqhttcw2jkc5fszyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5m6dj3a</id>
    
      <title type="html">🚨 9X Surge in Scanning for Ivanti Connect Secure. No CVEs are ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsygedzuptwrezpjlz397ehke596hta8krs76q72vqhttcw2jkc5fszyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5m6dj3a" />
    <content type="html">
      🚨 9X Surge in Scanning for Ivanti Connect Secure. No CVEs are tied to this yet, but patterns like this often precede exploitation. Full analysis &#43; suspicious IPs: &lt;a href=&#34;https://www.greynoise.io/blog/surge-ivanti-connect-secure-scanning-activity&#34;&gt;https://www.greynoise.io/blog/surge-ivanti-connect-secure-scanning-activity&lt;/a&gt; #Ivanti #Cybersecurity #Scanning
    </content>
    <updated>2025-04-23T20:40:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs98w2jqwk289judwvxsv7wf2hft8c09a4057u84rvlhhkzgyv7n0qzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv58vmjyz</id>
    
      <title type="html">🚨 New GreyNoise Tag Alert: We&amp;#39;ve added a fresh tag ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs98w2jqwk289judwvxsv7wf2hft8c09a4057u84rvlhhkzgyv7n0qzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv58vmjyz" />
    <content type="html">
      🚨 New GreyNoise Tag Alert: We&amp;#39;ve added a fresh tag tracking CrushFTP Authentication Bypass (CVE-2025-2825) exploitation attempts. Thanks to &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub13armu7zdf9840ldhtzushktn9lget8tyd0kac3swy0grn9dejj6qszp2f4&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Horizon3.ai&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub13ar…p2f4&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; for the intel! Dive into the details: &lt;a href=&#34;https://viz.greynoise.io/tags/crushftp-authentication-bypass-cve-2025-2825-attempt&#34;&gt;https://viz.greynoise.io/tags/crushftp-authentication-bypass-cve-2025-2825-attempt&lt;/a&gt;
    </content>
    <updated>2025-03-27T21:31:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsweapl8mfefd4ppr0y89z6vtzzlt2ledz3fu7tcdjv67ja6vffxuqzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv59k25p4</id>
    
      <title type="html">🚨Active Exploitation Alert: Critical Apache Tomcat RCE ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsweapl8mfefd4ppr0y89z6vtzzlt2ledz3fu7tcdjv67ja6vffxuqzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv59k25p4" />
    <content type="html">
      🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Full analysis &amp;amp; attacker IPs: &lt;a href=&#34;https://greynoise.io/blog/active-exploitation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813&#34;&gt;https://greynoise.io/blog/active-exploitation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813&lt;/a&gt;&lt;br/&gt;#ApacheTomcat #Apache #GreyNoise #Vulnerability #CVE202524813&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/196/407/729/558/204/original/bd5acbbb497fb86e.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-03-20T19:29:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst5nfctzdzvznd0tw9xy47zxue47zm0y28r6x3rvljzwg9gp0jkkqzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5alszss</id>
    
      <title type="html">🚨 March 12 UPDATE: Grafana Exploitation May Signal Multi-Phase ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst5nfctzdzvznd0tw9xy47zxue47zm0y28r6x3rvljzwg9gp0jkkqzyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5alszss" />
    <content type="html">
      🚨 March 12 UPDATE: Grafana Exploitation May Signal Multi-Phase SSRF Attacks. Update &#43; original analysis: &lt;a href=&#34;https://www.greynoise.io/blog/new-ssrf-exploitation-surge&#34;&gt;https://www.greynoise.io/blog/new-ssrf-exploitation-surge&lt;/a&gt; #Cybersecurity #GreyNoise #Vulnerability
    </content>
    <updated>2025-03-12T20:41:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrjm03pvl99a96jjed3s8xm8lywvlx5e27ejy75mt3lcult9kx0uczyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5ztnexd</id>
    
      <title>Nostr event nevent1qqsrjm03pvl99a96jjed3s8xm8lywvlx5e27ejy75mt3lcult9kx0uczyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5ztnexd</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrjm03pvl99a96jjed3s8xm8lywvlx5e27ejy75mt3lcult9kx0uczyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv5ztnexd" />
    <content type="html">
      Where do you get the most actionable threat intel? 🧐
    </content>
    <updated>2025-03-10T18:42:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv58vrnjxyf45g87snumqak2h54kfq4p4087z7mhc7u6f2w8x8mpczyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv558kcrm</id>
    
      <title type="html">🚨 Hackers Are Exploiting Fortinet Firewalls 🚨 15k&#43; ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv58vrnjxyf45g87snumqak2h54kfq4p4087z7mhc7u6f2w8x8mpczyrld4pr7mgujrt86snqccd3g03y6z5klwsv6a2xh69xsvdr8npnv558kcrm" />
    <content type="html">
      🚨 Hackers Are Exploiting Fortinet Firewalls 🚨&lt;br/&gt;15k&#43; FortiGate firewalls were breached via CVE-2022-40684. GreyNoise has spotted 366 compromised devices behaving abnormally. Defenders: Patch now, secure your systems, and check your IPs. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.greynoise.io/blog/hackers-actively-exploiting-fortinet-firewalls-real-time-insights-from-greynoise&#34;&gt;https://www.greynoise.io/blog/hackers-actively-exploiting-fortinet-firewalls-real-time-insights-from-greynoise&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/907/770/149/546/063/original/3d85b319fc4d6966.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-01-28T20:04:00Z</updated>
  </entry>

</feed>