Project Swarm: Join the Collective. Defend the Edge
ATT&CK techniques detected
T1190Exploit Public-Facing Application
66%
“preferred point of initial access. they exploit vulnerabilities in firewalls and vpn gateways, hijack built - in tools on perimeter devices to maintain persistence, and send quiet, targeted probes designed to blend into the background. the typhoon actors have demonstrated the mos…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1018Remote System Discovery
48%
“' s path that looks real enough to make them show their hand. when they probe a deceptive asset, they reveal themselves — their tools, their intent, their techniques — without ever knowing they ' ve been caught. the challenge is scale. to see the full picture, deception infrastru…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Today, we're launching Project Swarm — a research initiative that opens the GreyNoise deception platform to the global security community. Project Swarm transforms GreyNoise from a proprietary sensor network into a collective intelligence platform.