How is AI Changing the Threat Landscape?
Get the eBook
Censys logo with white text and circular design elements on a black background.
Censys logo featuring a circular icon with lines and the word "censys" in lowercase letters.
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Censys Platform
      • Internet Map
      • AI at Censys
      • Featured Post
        A digital illustration of a bar chart with a data point scatter pattern on a dark background.
        2025 State of the Internet: Introduction
        Read More
  • Solutions
      • Solutions
      • Description
        Powerful solutions that deliver end to end value for every type of security professional.
      • Censys Search
      • Security Operations and Triage
      • Attack Surface Management
      • Threat Hunting
      • Critical Infrastructure
      • Featured Post
        A technician in safety gear inspects a critical infrastructure control panel with a laptop in hand.
        Press Release: Censys Enhances Critical Infrastructure Protection with Unmatched Internet Visibility
        Read More
  • Industries
      • Industries
      • Description
        See how Censys empowers security teams across industries.
      • Cybersecurity
      • Energy and Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        A digital illustration of a server or data storage device with connected lines on a dark background.
        Unpacking the Oracle EBS Debacle: Industries, Geography, and MOVEit Comparisons
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys thought leadership on threat hunting, attack surface management, and industry trends.
      • Security Advisories
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events and Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        A digital illustration of a resource icon with a star symbol on a blue background.
        Accelerating Security Response with CensAI™
        Read More
  • Request Demo
  • Get Started Now
  • Login
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Censys Platform
      • Internet Map
      • AI at Censys
      • Featured Post
        A digital illustration of a bar chart with a data point scatter pattern on a dark background.
        2025 State of the Internet: Introduction
        Read More
  • Solutions
      • Solutions
      • Description
        Powerful solutions that deliver end to end value for every type of security professional.
      • Censys Search
      • Security Operations and Triage
      • Attack Surface Management
      • Threat Hunting
      • Critical Infrastructure
      • Featured Post
        A technician in safety gear inspects a critical infrastructure control panel with a laptop in hand.
        Press Release: Censys Enhances Critical Infrastructure Protection with Unmatched Internet Visibility
        Read More
  • Industries
      • Industries
      • Description
        See how Censys empowers security teams across industries.
      • Cybersecurity
      • Energy and Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        A digital illustration of a server or data storage device with connected lines on a dark background.
        Unpacking the Oracle EBS Debacle: Industries, Geography, and MOVEit Comparisons
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys thought leadership on threat hunting, attack surface management, and industry trends.
      • Security Advisories
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events and Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        A digital illustration of a resource icon with a star symbol on a blue background.
        Accelerating Security Response with CensAI™
        Read More
  • Request Demo
  • Get Started Now
  • Login

Rapid Response

A stylized diagram with concentric circles and lines radiating outward on a beige background.
Advisory
May 6 Advisory: Critical RCE Vulnerability Identified in Craft CMS [CVE-2025-32432]
A dark teal background features a central dotted circle with lines extending outward, resembling a modern infographic or
Advisory
May 2 Advisory: Critical Pre-Authentication RCE Vulnerability in Commvault Software [CVE-2025-34028]
A circular infographic with orange accents on a light blue background, featuring concentric rings and connecting lines.
Advisory
April 28 Advisory: SAP NetWeaver Actively Exploited Unauthenticated File Upload Vuln [CVE-2025-31324]
A dark teal background features a central dotted circle with lines extending outward, resembling a modern infographic or
Advisory
April 18 Advisory: Unauthenticated RCE in Erlang/OTP [CVE-2025-32433]
Abstract graphic with concentric circles and vertical lines on an orange background.
Advisory
April 11 Advisory: Actively Exploited Deserialization Vulnerability in Gladinet CentreStack Secure File Sharing Software [CVE-2025-30406]
A circular infographic with labeled sections on a light blue background, illustrating resource advisory information.
Advisory
April 10 Advisory: Vulnerability in FortiSwitch Allows Unauthenticated Attackers to Change Admin Passwords [CVE-2024-48887]
A beige background features a dotted circular pattern with a vertical white bar and a small star-like shape in the lower
Advisory
April 7 Advisory: Unauthenticated RCE Vulnerability in Ivanti Connect & Policy Secure and ZTA Gateway [CVE-2025-22457]
Abstract digital graphic with concentric circles and geometric shapes on a dark background.
Advisory
April 4 Advisory: Unauthenticated Auth Bypass Vulnerability in CrushFTP [CVE-2025-31161]
Abstract graphic with a central dotted circle, a plus sign on the left, and horizontal lines extending right and left.
Advisory
April 1 Advisory: Arbitrary File Read Vulnerability in NAKIVO Backup & Replication Added to CISA KEV [CVE-2024-48248]
A light blue background features a central dotted circle with lines and a diamond shape on the left, resembling a modern
Advisory
March 27 Advisory: Authentication Bypass Vulnerability in Next.js [CVE-2025-29927]
Censys logo with white text and circular design elements on a black background.

US: +1-888-985-5547

Intl: +1-877-438-9159

connect@censys.com

  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px
  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px

Copyright © 2026 Censys  |  Data Retention Policy  |  Terms & Conditions  |  Privacy Policy