Detect and Block Exploitation Attempts of the CVE-2024-4577 PHP-CGI Argument Injection Vulnerability
Explore the latest CVE-2024-4577 PHP-CGI Argument Injection vulnerability and learn how to detect and block malicious IPs attempting to exploit it.
Proactive Cybersecurity
Breaking 5 Misconceptions of Threat Intelligence Blocklists
Find out the truth about many SOC teams’ misconceptions of threat intelligence blocklists and why they are often perceived as complex and risky.
Tutorial
Protect Your Applications with AWS WAF and CrowdSec: Part I
Learn how to configure the AWS WAF Remediation Component to protect applications running behind an ALB that can block both IPs and countries.
Tutorial
Protect Your Serverless Applications with AWS WAF and CrowdSec: Part II
Learn how to protect your serverless applications hosted behind CloudFront or Application Load Balancer with CrowdSec and the AWS WAF.
Product Updates
Streamlining ELK Stack with CrowdSec via Syslog
By integrating CrowdSec with the ELK stack via Syslog, you can enhance your security monitoring capabilities and bolster your threat detection mechanisms.
Inside CrowdSec
Upgrading the CrowdSec Infrastructure to Support IPv6-Only Users
Follow our journey as we upgrade the CrowdSec infrastructure to allow our IPv6-only users to set up CrowdSec without any hiccups.
Use Case
CrowdSec Protects the IUT de Bordeaux against Breach Attempts Using the Power of the Crowd
By leveraging CrowdSec’s open source and collaborative approach, Bordeaux IUT mitigates security risks and fosters a culture of transparency and resilience.
Vulnerabilities
Investigating Exploit Attacks of the D-Link NAS CVE-2024-3273 Vulnerability
The CVE-2024-3273 exploit for D-Link NAS devices is being used aggressively by botnets hijacking IoT devices. Learn more about this exploit and how to block it.
Product Updates
Enabling Threat Hunting and Analysis with the Revamped CrowdSec CTI Report
We are introducing a much-needed revamp of the CrowdSec CTI report to empower threat hunters and analysts to swiftly locate vital threat information.
Announcement
Introducing the New CrowdSec and BunkerWeb Integration
We are thrilled to welcome BunkerWeb into the CrowdSec Network and together strengthen collaborative open security for both our communities.
Announcement
Revolutionizing Security Analysis with CrowdSec and Microsoft Copilot for Security
We are announcing the CrowdSec CTI and Microsoft Copilot for Security integration, which signals a new era of collaborative and intelligent security operations.
Guest Post
Building a Network for Small Businesses Part 3: Attack Scenarios
In part 3 of this series, Péter walks you through implementing and testing attack scenarios to protect networks for small businesses.
Guest Post
Building a Network for Small Businesses Part 2: Running Configurations
In part 2 of this series, Peter dives into running configurations on the firewall, with explanations of the design decisions made for each service.
Guest Post
Building a Network for Small Businesses Part 1: Hardware
Learn how to build, test, and secure networks with CrowdSec for small businesses to achieve a more affordable firewall and router combination.
Inside CrowdSec
Network Effect x AI: Transforming CTI into Tactical Threat Intelligence
Delve into IP-based cyber defense and explore how the Network Effect and AI are transforming CTI into crowd-powered Tactical Threat Intelligence.
Product Updates
Explore CrowdSec Blocklists with the New Blocklist Catalog
Introducing a centralized hub to explore and compare the CrowdSec Blocklists, helping you select the most relevant to your security needs.
Use Case
Scalable and Low-Friction Authentication for MSSPs with the CrowdSec IDPS
Scaling can be an issue for smaller teams. See how we helped an MSSP user achieve scalable & low-friction authentication in 30 minutes with the CrowdSec IDPS.
Tutorial
Securing A Multi-Server CrowdSec Security Engine Installation With HTTPS
In part II of this series, you learn about the three different ways to achieve secure TLS communications between your CrowdSec Security Engines in a multi-server setup.
Tutorial
Setting up A Multi-Server CrowdSec Security Engine Installation
In part I of this series, you learn how to deploy multiple Security Engines in a multi-server setup with one of the servers configured to store and share the collected signals.
Use Case
Crédit Mutuel Arkéa Relies on CrowdSec and Crowd-Powered Intelligence to Block Malicious IPs
Crédit Mutuel Arkéa, the leading bancassurance group in France, uses the CrowdSec Security Stack to protect its systems against malicious traffic.
Vulnerabilities
New Surge in VMware Workspace ONE Vulnerability CVE-2022-22954 Exploit Attempts Detected
A recent surge in CVE-2022-22954 exploitation attempts detected by the CrowdSec Network points to a potential new botnet using common vulnerabilities.