GreyNoiseIO Profile Banner
GreyNoise Profile
GreyNoise

@GreyNoiseIO

Followers
28K
Following
2K
Media
280
Statuses
2K

GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.

Lots of different datacenters
Joined September 2017
Don't wanna be here? Send us removal request.
@GreyNoiseIO
GreyNoise
8 days
GreyNoise has linked three concurrent campaigns targeting remote-access technologies β€” Palo Alto login attempts, Fortinet SSL VPN brute-forcing, and Cisco ASA scanning β€” all partially driven by the same threat actor(s) [High Confidence]. Full analysis πŸ‘‡ https://t.co/gd89IAtk3u
Tweet card summary image
greynoise.io
On October 3, 2025, GreyNoise observed a ~500% increase in IPs scanning Palo Alto Networks login portals, the highest level recorded in the past 90 days.Β The activity was highly targeted and involved...
1
6
27
@GreyNoiseIO
GreyNoise
16 hours
Amid the security incident involving F5 BIG-IP announced today, GreyNoise is sharing recent insights into activity targeting BIG-IP to aid in defensive posturing. The anomalies reported in our blog may not necessarily relate to the 15 Oct incident. ⬇️ https://t.co/7lGQqC4PVc
Tweet card summary image
greynoise.io
Amid the security incident involving F5 BIG-IP announced on 15 October 2025, GreyNoise is sharing recent insights into activity targeting BIG-IP to aid in defensive posturing.
1
7
25
@GreyNoiseIO
GreyNoise
21 hours
Use GreyNoise Block to dynamically block all IPs associated with this botnet: https://t.co/OcPa1ZTZu8 #RDP #Botnet #Cybersecurity
0
0
1
@steftsitsipas
Stefanos Tsitsipas
20 days
Nothing bonds players faster than disliking the same umpire.
31
33
661
@GreyNoiseIO
GreyNoise
21 hours
A global botnet has tripled in size in the past five days, so GreyNoise is sharing an executive situation report (SITREP) to streamline decision making. Full SITREP: https://t.co/2ug1VLp82V
1
2
6
@GreyNoiseIO
GreyNoise
2 days
Attacker infrastructure evolves in real time. Your defenses should too. Introducing GreyNoise Block, ensuring your blocklists update automatically. 🦾 https://t.co/kygl0XzwKl
Tweet card summary image
greynoise.io
Discover why traditional blocklists fail and how GreyNoise Block offers real-time, configurable, low-noise IP blocking powered by primary-sourced intelligence.
0
10
38
@GreyNoiseIO
GreyNoise
3 days
Hey #CriblCon25! πŸ‘‹ Looking forward to seeing you soon! πŸ‘»πŸ€πŸ
0
1
10
@GreyNoiseIO
GreyNoise
6 days
The GreyNoise team will be at #CriblCon next week and we would love to see you there! If you are headed to Maryland for the event, check out our booth and talk to the team. πŸ‘»πŸ€πŸ πŸ”— https://t.co/OTLv16DBFU
0
2
4
@GreyNoiseIO
GreyNoise
8 days
GreyNoise Feeds are here: real-time webhook alerts for CVE status changes, exploitation spikes, and IP classification changes. No more polling. Respond the moment threats emerge. 🦾 https://t.co/Rknoe2Txd7
Tweet card summary image
greynoise.io
Learn how GreyNoise Feeds enable real-time, event-driven threat intelligence that eliminates polling delaysβ€”helping defenders react instantly to new exploits, IP threats, and zero-day activity.
0
7
28
@GreyNoiseIO
GreyNoise
9 days
Palo login attempts are escalating, potentially driven by iteration through a large credential dataset. GreyNoise is sharing observed usernames/passwords for defender review. πŸ”— Latest: https://t.co/gd89IAtk3u #PaloAltoNetworks #ThreatIntel
1
18
58
@GreyNoiseIO
GreyNoise
10 days
NoiseLetter, but make it fashionably late... πŸ’… We were at our company offsite, but we're back with our new GreyNoise MCP Server launch, Cisco ASA zero-day and VPN brute force insights, plus upcoming events, let's get into it!
Tweet card summary image
greynoise.io
Get GreyNoise updates! Read the September 2025 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.
0
4
12
@GreyNoiseIO
GreyNoise
13 days
GreyNoise observed a ~500% surge in IPs scanning Palo Alto Networks login portals on October 3, 2025 β€” the highest level we’ve seen in 90 days. Read our full analysis here πŸ‘‰ https://t.co/gd89IAsMdW #PaloAltoNetworks #PaloAlto #GreyNoise #ThreatIntel #PANOS
Tweet card summary image
greynoise.io
On October 3, 2025, GreyNoise observed a ~500% increase in IPs scanning Palo Alto Networks login portals, the highest level recorded in the past 90 days.Β The activity was highly targeted and involved...
1
14
33
@GreyNoiseIO
GreyNoise
14 days
We got (most of) the team together last week and it was magical, so grateful for each + every one of these GreyNoids ✨
0
2
12
@GreyNoiseIO
GreyNoise
15 days
GreyNoise now has coverage for Cisco zero-days CVE-2025-20333 and CVE-2025-20362. Watch for exploit attempts in real-time: CVE-2025-20333 (Net new):Β  https://t.co/V0CueAEKAp CVE-2025-20362 (Updated tag):Β  https://t.co/o159T4UUES #CiscoASA #Cisco #ZeroDay #CiscoZeroDays
0
23
61
@GreyNoiseIO
GreyNoise
16 days
O Canada, see you tomorrow! 🍁
@runZeroInc
runZero, Inc.
16 days
🍻 At SecTor 2025? Unwind with runZero + @GreyNoiseIO at our happy hour! πŸ“… Wed, Oct 1 | 6–8pm πŸ“ The Pint Public House, Toronto 🍺 Free pints + light apps πŸ‘‰ RSVP: https://t.co/du3O950GZV
0
1
3
@ryanaraine
Ryan Naraine
17 days
GreyNoise: Reconnaissance surge on Cisco ASA preceded zero-days
0
7
17
@runZeroInc
runZero, Inc.
17 days
🍁 runZero is at SecTor! 🎀 Rob King β€” spotting counterfeit devices (Wed 4:15pm, Rm 716B) 🎀 @hdmoore β€” rules of cybersecurity (Thu 9am, Hall F) 🍻 HH w/@GreyNoiseIO (Wed 6–8pm, The Pint) πŸ‘‰RSVP: https://t.co/hvkWlPgWC5 βœ… Register: https://t.co/EUN5UycWB4
1
3
4
@GreyNoiseIO
GreyNoise
17 days
🚨GreyNoise has published a new Situation Report on Cisco ASA reconnaissance activity we observed before the new zero-days were disclosed. Read the full report: https://t.co/VbUlVBEWha #Cisco #ASA #CiscoASA #GreyNoise #ThreatIntel #CVE202520333 #CVE202520362
3
25
70