451 Followers
20 Following
406 Posts
CrowdSec is a CTI tool leveraging crowdsourced data to identify and block malevolent IPs in real time worldwide. Join our Discord: http://discord.gg/crowdsec
Websitehttps://www.crowdsec.net/
GitHubhttps://github.com/crowdsecurity/crowdsec
Discordhttps://www.discord.gg/crowdsec
LinkedInhttps://www.linkedin.com/company/53443483

New Console Feature Drop: Attack Map is LIVE! 🌍⚑

Get a powerful visual view of your threat landscape:
πŸ” Replay attacks from the last 24h or 48h
πŸ“Š Volumetric insights over 24h, 48h, 7d, or 30d
πŸŽ₯ One-click GIF export to share your attack activity instantly

See exactly where attacks are coming from, identify top scenarios, and track malicious IPs, all in an interactive map.

Check it out: https://app.crowdsec.net/alerts

#cybersecurity #threatintelligence #infosec

Le Monde leverages CrowdSec to automate firewall updates, block malicious IPs, and defend against phishing, scans, and other threats, while saving valuable time for its IT team.

Discover the story behind their security strategy πŸ‘‰ https://www.crowdsec.net/blog/le-monde-automates-security-maximizes-efficiency 

Join us next week for an interactive Community Office Hours!

Get an exclusive preview of what’s coming next for the CrowdSec WAF. We’ll unveil upcoming features, including:
πŸ”Ž Smarter bot detection
βš™οΈEasier rule creation via the local MCP

πŸ‘€ Take a peek at the roadmap, get practical tips, ask your questions live, and see how these innovations can strengthen your security posture.

πŸ“… Don’t miss it, join us here: https://www.youtube.com/live/UlAamXEZh1I

#WAF #MCP #community #webinar #cybersecurity

Kubernetes networking is evolving 🌐 with the rise of the Gateway API, offering more flexible and extensible traffic management.

CrowdSec continues to support Ingress-NGINX during its final lifecycle, while helping users migrate to modern ingress controllers like Traefik and HAProxy, or Gateway API integrations, for future-proof security πŸ”’.

Read our latest article for details: https://www.crowdsec.net/blog/crowdsec-support-kubernetes-ingress-nginx

#Kubernetes #IngressNGINX #GatewayAPI

🚨 In this week’s threat alert, CrowdSec reports on CVE-2026-23744, a critical RCE in MCPJam Inspector. Exploitation attempts are rising, targeting exposed dev environments.

Learn how the vulnerability works and how to secure your systems in our latest article πŸ‘‰ https://www.crowdsec.net/vulntracking-report/cve-2026-23744

πŸš€πŸŽ‰ Big news: CrowdSec Blocklists are now available on the @Amazon Web Services (AWS) Marketplace!

βœ”οΈ Real-time, crowd-powered intelligence
βœ”οΈ Ultra-curated blocklists with 0 false positives
βœ”οΈ Stop malicious IPs, reduce SOC alerts, and prevent IAM brute force & fraud

Learn more: https://aws.amazon.com/marketplace/pp/prodview-yh6m5csuqxg6m?sr=0-3&ref_=beagle&applicationId=AWSMPContessa

New CVE? We immediately analyze exploitability, validate impact, and ship patches or virtual protections fast to shrink the exposure window. 

Watch the full video to learn more πŸ‘‰ https://youtube.com/live/oedE1_ycS4o

#WAF #virtualpatching #cybersecurity

Thousands of CVEs. But which ones are actually being exploited right now?

Live Exploit Tracker cutsβœ‚οΈ through the noise by showing vulnerabilities that attackers are actively exploiting in the wild, based on real attacks observed across hundreds of thousands of production systems.

With Live Exploit Tracker, you can:
β€’ Prioritize remediation based on real-world exploitation
β€’ Accelerate mitigation with high-confidence, actionable intelligence
β€’ Anticipate emerging CVEs by observing exploit behavior in real time

Learn more πŸ‘‰ https://www.crowdsec.net/live-exploit-tracker

What if your logs already show signs of a targeted attack, but the pattern is easy to miss? πŸ”Ž

Am I Under Attack analyzes alert activity with AI to identify suspicious surges and notify you when your infrastructure may be under threat. 🚨

Detect targeted attacks before they escalate.

Read more: https://www.crowdsec.net/blog/am-i-under-attack

🚨 In this week’s threat alert, we dive into CVE-2025-20281, a critical Cisco Identity Services Engine (ISE) RCE vulnerability, as CrowdSec Threat Intelligence observes a new wave of exploitation attempts. We break down how the vulnerability works, why attackers are now incorporating it into opportunistic exploit kits, and what defenders should do to stay protected.

Read the full analysis and protect your systems πŸ‘‰ https://www.crowdsec.net/vulntracking-report/cve-2025-20281-cisco-ise-rce-exploitation

CVE-2025-20281: Cisco ISE Critical RCE Under Active Exploitation

CVE-2025-20281 is a critical CVSS 10.0 RCE vulnerability in Cisco Identity Services Engine (ISE). CrowdSec observes a new surge of exploitation attempts targeting exposed REST APIs