Criminal IP ASM Integration Services now available on Logpresso

Criminal IP Attack Surface Management (ASM) is integrated into the SOAR (Security Orchestration, Automation, and Response) platform Logpresso. Criminal IP ASM can be executed on the Logpresso dashboard through the API provided by Criminal IP. So, IT assets exposed to the attack surface can be automatically monitored, and the presence of VPN, Tor, and Proxy [...]

By |2023-03-14T16:54:22+09:00August 25th, 2022|Tags: , , |0 Comments

Attack Surface Management: Monitoring Unknown Assets and Vulnerabilities

It is well-known that most companies utilize various network equipment, databases, applications, and domains and that these IT properties often operate under a myriad of IP addresses and ports. Hackers with malicious intent, with this knowledge, begin their methods of infiltration by searching for open ports and targeting servers with severe security vulnerabilities. This has made Attack [...]

By |2023-03-22T12:58:03+09:00August 16th, 2022|Tags: , , |4 Comments

Criminal IP Analysis Report on Log4j Attack Patterns

The Log4j vulnerability has impacted the world, leading hackers to conduct daily scans of servers worldwide in search of those infected with Log4j vulnerabilities, which could potentially allow them to take control of the servers. We have closely examined their scanning technologies to identify servers with Log4j vulnerabilities. The hackers' primary method involved sending the [...]

By |2023-06-02T20:47:19+09:00February 11th, 2022|Tags: , , , , |0 Comments
Go to Top