Criminal IP ASM Integration Services now available on Logpresso

Criminal IP's services are now available for integration with Logpresso, the famous Security Orchestration, Automation and Response (SOAR) platform. Attaching this API to your Logpresso dashboard enables access to Criminal IP's Attack Surface Management (ASM) services dedicated to monitoring vulnerable IT assets on attack surfaces, and to check for presences of VPN, Tor and Proxy IP. [...]

By |2022-08-25T19:17:02+09:00August 25th, 2022|Tags: , , |0 Comments

Attack Surface Management: Monitoring Unknown Assets and Vulnerabilities

It is well-known that most companies utilize various network equipment, databases, applications, and domains and that these IT properties often operate under a myriad of IP addresses and ports. Hackers with malicious intent, with this knowledge, begin their methods of infiltration by searching for open ports and targeting servers with severe security vulnerabilities. This has made Attack [...]

By |2022-08-16T17:13:28+09:00August 16th, 2022|Tags: , , |2 Comments

Criminal IP Analysis Report on Log4j Attack Patterns

Log4j vulnerability hit the world. Hackers are scanning all the servers around the world everyday in search for servers infected with the Log4j vulnerabilities that would enable to them to eventually take over the servers. We took a close look at what scanning technologies that they use to find servers with Log4j vulnerabilities. Their most [...]

By |2022-06-20T14:24:22+09:00February 11th, 2022|Tags: , , , , |0 Comments
Go to Top