462 Followers
20 Following
423 Posts
CrowdSec is a CTI tool leveraging crowdsourced data to identify and block malevolent IPs in real time worldwide. Join our Discord: http://discord.gg/crowdsec
Websitehttps://www.crowdsec.net/
GitHubhttps://github.com/crowdsecurity/crowdsec
Discordhttps://www.discord.gg/crowdsec
LinkedInhttps://www.linkedin.com/company/53443483

🌍 See your attacks as they happen.

Replay attack activity, identify top malicious IPs, and visualize where threats are coming from — all from a single interactive map.

From volumetric insights to instant GIF exports, CrowdSec’s Attack Map helps turn raw alerts into clear visibility 👇

https://app.crowdsec.net/alerts?view=map

#cybersecurity #threatintelligence #infosec

🚨 In this week’s newsletter, we cover CVE-2026-41940, a cPanel & WHM authentication bypass that puts entire hosting environments at risk. We break down how it enables admin access and what defenders should do next.

Read the full analysis and protect your systems 👉 https://www.crowdsec.net/vulntracking-report/cve-2026-41940-cpanel-whm-authentication-bypass-exploitation

Kubernetes moves fast.
Static security doesn’t.

Protect your ingress with real-time blocking + GitOps-friendly deployment 👇
https://crowdsec.net/blog/secure-kubernetes-ingress-with-crowdsec-and-traefik-devsecops-at-scale

#Kubernetes #DevSecOps #CloudSecurity

🚨 In this week’s newsletter, we cover CVE-2026-21643, a FortiClient EMS SQL injection now under active exploitation. We break down how it moved from advisory to real attacks and what defenders should do next.

Read the full analysis and protect your systems 👉 https://www.crowdsec.net/vulntracking-report/cve-2026-21643-forticlient-ems-sql-injection-exploitation

💭 Did you know? ⟶ Am I Under Attack monitors your Security Engine alerts 24/7 so you don’t have to.

This means that while CrowdSec’s AI keeps an eye on unusual patterns and potential threats around the clock, your team can focus on critical security tasks instead of sifting through endless logs 🔥

Learn more about how to activate Am I Under Attack and stay ahead of targeted attacks: https://www.crowdsec.net/blog/am-i-under-attack

🚨 In this week’s newsletter, we cover CVE-2026-21445, a Langflow authentication bypass now under active exploitation. We break down how PoCs turned into real attacks and what defenders should do next.

Read the full analysis and protect your systems 👉 https://www.crowdsec.net/vulntracking-report/cve-2026-21445-langflow-authentication-bypass-exploitation

📶 Web application security requires multiple layers.

OWASP CRS provides rule-based protection, while CrowdSec adds real-time, collaborative threat intelligence.

Combining both helps defend against both known and evolving threats.

Read more:
https://www.crowdsec.net/blog/protecting-your-web-applications-with-owasp-crs-and-crowdsec

#CyberSecurity #OWASP #WAF #Infosec

🍯 Honeypots provide insights, but they don’t always reflect real attack activity.

Production telemetry, on the other hand, captures what’s happening across live systems.

Understanding the difference is key to better security decisions.

Read more:
https://www.crowdsec.net/blog/honeypots-vs-production-telemetry-what-cisos-should-trust

#CyberSecurity #ThreatIntelligence #Infosec

🚨 CVE-2025-4396 is seeing a surge in exploitation attempts.

This SQL injection vulnerability in the WordPress Relevanssi plugin has attracted over 16,500 attacking IPs, mostly targeting small sites with limited security.

We break down the attack and how to defend against it 👇

https://www.crowdsec.net/vulntracking-report/cve-2025-4396-wordpress-relevanssi-sql-injection

🚀 CrowdSec is hiring!

We’re growing our data team and looking for:
• Data Analyst
• Data Analyst Intern

If you enjoy working with data, uncovering patterns, and contributing to real-world security, this is your chance to make an impact.

🔗 Apply now:
👉 Data Analyst: https://lnkd.in/e7_qrxDu

👉 Data Analyst - Internship: https://lnkd.in/evavHewv

#Hiring #DataAnalyst #CyberSecurity #OpenSource #Infosec #Careers