How is AI Changing the Threat Landscape?
Get the eBook
Censys logo with white text and circular design elements on a black background.
Censys logo featuring a circular icon with lines and the word "censys" in lowercase letters.
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Censys Platform
      • Internet Map
      • AI at Censys
      • Featured Post
        A digital illustration of a bar chart with a data point scatter pattern on a dark background.
        2025 State of the Internet: Introduction
        Read More
  • Solutions
      • Solutions
      • Description
        Powerful solutions that deliver end to end value for every type of security professional.
      • Censys Search
      • Security Operations and Triage
      • Attack Surface Management
      • Threat Hunting
      • Critical Infrastructure
      • Featured Post
        A technician in safety gear inspects a critical infrastructure control panel with a laptop in hand.
        Press Release: Censys Enhances Critical Infrastructure Protection with Unmatched Internet Visibility
        Read More
  • Industries
      • Industries
      • Description
        See how Censys empowers security teams across industries.
      • Cybersecurity
      • Energy and Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        A digital illustration of a server or data storage device with connected lines on a dark background.
        Unpacking the Oracle EBS Debacle: Industries, Geography, and MOVEit Comparisons
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys thought leadership on threat hunting, attack surface management, and industry trends.
      • Security Advisories
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events and Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        A digital illustration of a resource icon with a star symbol on a blue background.
        Accelerating Security Response with CensAI™
        Read More
  • Request Demo
  • Get Started Now
  • Login
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Censys Platform
      • Internet Map
      • AI at Censys
      • Featured Post
        A digital illustration of a bar chart with a data point scatter pattern on a dark background.
        2025 State of the Internet: Introduction
        Read More
  • Solutions
      • Solutions
      • Description
        Powerful solutions that deliver end to end value for every type of security professional.
      • Censys Search
      • Security Operations and Triage
      • Attack Surface Management
      • Threat Hunting
      • Critical Infrastructure
      • Featured Post
        A technician in safety gear inspects a critical infrastructure control panel with a laptop in hand.
        Press Release: Censys Enhances Critical Infrastructure Protection with Unmatched Internet Visibility
        Read More
  • Industries
      • Industries
      • Description
        See how Censys empowers security teams across industries.
      • Cybersecurity
      • Energy and Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        A digital illustration of a server or data storage device with connected lines on a dark background.
        Unpacking the Oracle EBS Debacle: Industries, Geography, and MOVEit Comparisons
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys thought leadership on threat hunting, attack surface management, and industry trends.
      • Security Advisories
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events and Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        A digital illustration of a resource icon with a star symbol on a blue background.
        Accelerating Security Response with CensAI™
        Read More
  • Request Demo
  • Get Started Now
  • Login

Rapid Response

A stylized diagram with concentric circles and lines radiating outward on a beige background.
Advisory
June 12 Advisory: Wazuh RCE Vulnerability Exploited to Deploy Mirai Botnets [CVE-2025-24016]
Abstract graphic with concentric circles and vertical lines on an orange background.
Advisory
June 10 Advisory: Roundcube Webmail Vulnerable to Authenticated RCE [CVE-2025-49113]
A light blue background features a central dotted circle with lines and a diamond shape on the left, resembling a modern
Advisory
June 6 Advisory: vBulletin Allows Unauthenticated Users to Invoke Protected API Controllers’ Methods to Achieve RCE [CVE-2025-48827-48828]
Abstract graphic with concentric circles and lines on a peach background, titled 'CEN0001-resources-advisory-10-1'.
Advisory
June 5 Advisory: ConnectWise ScreenConnect Vulnerability Added to CISA KEV [CVE-2025-3935]
Abstract blue graphic with concentric circles and lines, resembling a technological or data visualization design.
Advisory
May 30 Advisory: Samsung MagicInfo9 Path Traversal Vulnerability Added to CISA KEV [CVE-2025-4632]
A circular infographic with orange accents on a light blue background, featuring concentric rings and connecting lines.
Advisory
May 28 Advisory: Ivanti EPMM Chained Exploits Added to CISA KEV [CVE-2025-4427-4428]
Abstract graphic with a central dotted circle, a plus sign on the left, and horizontal lines extending right and left.
Advisory
May 23 Advisory: Srimax Output Messenger Directory Traversal Vulnerability Added to CISA KEV [CVE-2025-27920]
A circular infographic with orange accents on a light blue background, featuring concentric rings and connecting lines.
Advisory
May 22 Advisory: Synacor Zimbra Collaboration Suite XSS Vulnerability Added to CISA KEV [CVE-2024-27443]
Abstract graphic with concentric circles and vertical lines on an orange background.
Advisory
May 16 Advisory: Stack-Based Buffer Overflow Vulnerability Affecting Multiple Fortinet Products [CVE-2025-32756]
Abstract blue graphic with concentric circles and lines, resembling a technological or data visualization design.
Advisory
May 7 Advisory: Unauthenticated Code Injection Vulnerability in Langflow [CVE-2025-3248]
Censys logo with white text and circular design elements on a black background.

US: +1-888-985-5547

Intl: +1-877-438-9159

connect@censys.com

  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px
  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px

Copyright © 2026 Censys  |  Data Retention Policy  |  Terms & Conditions  |  Privacy Policy