Il 14 gennaio qualcuno ha staccato la spina a Telnet. Il traffico globale è crollato del 65% in un'ora, sei giorni prima che il mondo sapesse perché. Taiwan ha filtrato il 77%, l'India il 70%, il Giappone il 65%.

Un protocollo nato nel 1969, una vulnerabilità nascosta per 11 anni, 52 IP da 16 paesi che hanno tentato l'exploit, e un mistero che sembra un thriller. La storia completa nel nuovo episodio del buongiornirondirondello.

https://youtu.be/vVQuEC0Py3s?si=-xV2PRSFLz9mbURb

#telnet #security #arpanet #protocolli #greynoise

Telnet è scomparso improvvisamente. Chi ha chiuso la porta 23? - Buongiorno 315

YouTube

52% of RCE attempts came from IPs with no prior GreyNoise history. New research on where edge defenses fall short + what to do about it: https://www.greynoise.io/resources/2026-state-of-the-edge-report

#ThreatIntel #Cybersecurity #GreyNoise

2026 State of the Edge Report

GreyNoise observed 212 exploitation attempts per second in H2 2025. The 2026 State of the Edge Report reveals attack patterns, exposes defense gaps, and prioritizes what to fix.

This week's At the Edge: CLEAR is out — a preview of the intel brief GreyNoise customers get every week.

🔗 https://www.greynoise.io/resources/at-the-edge-clear-021626

That's just the preview. greynoise.io/contact

#ThreatIntel #CyberSecurity #GreyNoise

Telnet traffic didn’t “trend down” — it reportedly fell off a cliff. GreyNoise says global sessions dropped 65% in one hour on Jan 14, days before CVE-2026-24061 (GNU InetUtils telnetd, 9.8) went public Jan 20. Smells like someone quietly slammed the port-23 door… who got the laser pointer? 😼

https://tech.slashdot.org/story/26/02/14/0447228/sudden-telnet-traffic-drop-are-telcos-filtering-ports-to-block-critical-vulnerability

#Telnet #CyberSecurity #GreyNoise

Sudden Telnet Traffic Drop. Are Telcos Filtering Ports to Block Critical Vulnerability? - Slashdot

An anonymous reader shared this report from the Register: Telcos likely received advance warning about January's critical Telnet vulnerability before its public disclosure, according to threat intelligence biz GreyNoise. Global Telnet traffic "fell off a cliff" on January 14, six days before secu...

Three campaigns. One has Cobalt Strike ready.

RDP nearly quadrupled. A botnet picked up a new CVE. And someone built a Kubernetes cluster just to exploit n8n.

A preview of what GreyNoise customers get every week. Full brief has the IOCs, attribution, and analysis.

#ThreatIntelligence #InfoSec #GreyNoise #CyberSecurity

We observed a 65% drop in global telnet traffic in a single hour on Jan 14, settling into a sustained 59% reduction. 18 ASNs went silent, 5 countries disappeared, but cloud providers were unaffected.

Our analysis of 51.2M sessions points to backbone-level port 23 filtering by a North American Tier 1 transit provider.

🔗 https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

#GreyNoise #ThreatIntel #CyberSecurity #InfoSec

2026-01-14: The Day the telnet Died – GreyNoise Labs

On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.

GreyNoise Labs
GreyNoise tracks massive Citrix Gateway recon using 63K+ residential proxies and AWS

GreyNoise spotted a dual-mode Citrix Gateway recon campaign using 63K+ residential proxies and AWS to find login panels and enumerate versions

Security Affairs

⚠️ Unlike typical exploits, no buffer overflow or memory corruption needed - just one manipulated environment variable grants root access

🛡️ Not all Telnet implementations affected - only #GNU inet utils; proprietary versions like #Cisco and #BusyBox are safe

📊 #GreyNoise threat intelligence reports multiple exploit attempts per hour already detected in the wild

🔄 Telnet's unencrypted nature makes attacks visible to defenders monitoring plaintext traffic for "-f root" patterns

Toads in my AI

News and announcements from the Python community for the week of Jan 26th, 2026

New on the GreyNoise blog: We borrow from some unexpected fields, enzyme kinetics, species biodiversity models, astrophotography, to understand internet-wide scanning activity and measure what we might be missing.

https://www.greynoise.io/blog/filtering-noise-cyber-space

#GreyNoise #Cybersecurity

Filtering Noise in (Cyber)Space

Dive into the scientific methods GreyNoise uses to separate internet noise from real threats, providing defenders a clearer, more accurate view of malicious activity.