Protect Your Websites with CrowdSec and Nginx Proxy Manager
Follow this tutorial and learn how to add an extra layer of protection to your websites with Nginx Proxy Manager and CrowdSec.
Tutorial
Monitoring Suspicious Behavior on Shared Hosting Platforms
There are many risks associated with running a shared hosting service. Learn how to monitor and proactively mitigate some of these risks using CrowdSec.
Tutorial
Reduce Alert Fatigue and Optimize Decision-Making with CrowdSec CTI Helpers
Direct access to the CrowdSec CTI through the Security Engine helps you reduce alert fatigue, optimize triage, and make better and faster decisions.
Vulnerabilities
Detect Exploitation Attempts of the Looney Tunables Vulnerability in Your System
Brute force attacks are the most prevalent way to exploit the Looney Tunables vulnerability in your system. Here’s how to get notified of such attempts.
Tutorial
A Guide to Continuous Deployment for the Overly Suspicious
Explore a comprehensive guide to Continuous Deployment strategies and tools for enhanced security integration.
Data Curation
Understanding the Basics of the Bayesian Bucket, How It Works and How to Use It
Bayesian reasoning has applications in cybersecurity and the detection of malicious behavior. Learn how the Bayesian bucket works and how to use it.
Inside CrowdSec
The Curious Case of Netgear RCE and How Vulnerabilities Persist in the Wild
We report on the Netgear RCE, provide data on the exploit, show how the exploit works in practice, and speculate on vulnerability still persist in the wild.
Product Updates
Simplify Threat Detection with Alert Context
Understanding the triggers behind a security alert is crucial for smooth security operations and simplifying threat detection.
Black Hat USA 2023 and DEF CON 31 Wrap-Up: The Critical Role of Cybersecurity in the Future of AI
Highlights from Black Hat USA 23 & DEF CON 31 include the critical role of cybersecurity professionals in AI policymaking and the need for global collaboration.
Tutorial
How to Secure Ingress Traffic for a Fleet of Servers
Follow this walkthrough and learn how to levarage real-ime Decision Management and manage ingress traffic for a fleet of servers.
Data Curation
AI-Powered Proxy and VPN Detection — The CrowdSec Way
Learn how CrowdSec detects VPN and proxies using machine learning models and leveraging attack patterns exposed by IPs to improve detection.
Events
Silicon Valley Just Got More Secure — CrowdSec Has Landed
CrowdSec will be at Black Hat USA and DEFCON 2023. Join us to learn more about how CrowdSec is shaping the future of proactive and collaborative cybersecurity.
Announcement
Announcing the Q2 2023 CrowdSec Majority Report
We are thrilled to announce the release of the CrowdSec Majority Report for Q2 2023, where we are exploring cyber threat trends worldwide.
Proactive Cybersecurity
What is NIS2: Scope, Impacted Sectors, and How to Prepare
The new regulation on Network and Information Security (NIS2) enacts stricter, GDPR-like, regulations on cybersecurity. Learn how you can prepare.
Tutorial
Monitor Audit Logs to Safeguard Your Kubernetes Infrastructure
Safeguard your Kubernetes infrastructure against potential threats by monitoring Kubernetes audit logs using the CrowdSec Security Engine.
Tutorial
Exploring the CrowdSec Security Engine & open-appsec Open Source WAF Integration
Learn how to use the combined strength of community-driven threat intelligence and innovative machine learning threat prevention to analyze attack behaviors.
Tutorial
Detecting Suspicious IP Behavior and Impossible Travel
Learn how to detect impossible travel and other suspicious IP behaviors using the conditional bucket feature in CrowdSec Security Engine 1.5.
Tutorial
Detect Security Incidents with AWS CloudTrail & CrowdSec Security Engine
Learn how to detect brute force and other security incidents on the AWS Console using AWS CloudTrail and the CrowdSec Security Engine.
Product Updates
How to Detect Successful SSH Brute Force Attacks
Detect successful SSH brute force attacks effectively with advanced security tools and proactive monitoring measures. Protect your systems from unauthorized access.
Announcement
Introducing an update to the CrowdSec Naming Taxonomy
We’re updating the various components of the CrowdSec ecosystem to be in line with what SecOps and cybersecurity professionals are used to seeing day-to-day.
Product Updates
CrowdSec Security Engine 1.5 is officially here!
The biggest release since 1.0, CrowdSec Security Engine 1.5 brings you new features, major enhancements, and more control of your security management. Discover all that is new in 1.5 and how to get started in this article.