Join the Censys ARC Webcast on April 29 (live Q&A for attendees only)
Register Now
Censys logo featuring a circular icon with lines and the word "censys" in lowercase letters.
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Platform Overview
      • Internet Map
      • Integrations
      • AI at Censys
      • Description
        Purpose-built capabilities that power security operations and exposure management.
      • Censys Search
      • Censys Enterprise
      • Adversary Investigation
      • Attack Surface Management
      • Critical Infrastructure Monitoring
      • Featured Post
        Cover page of the 2025 State of the Internet Report by Censys, featuring a world map and report title.
        The 2025 State of the Internet Report
        Read More
  • Solutions
      • Solutions
      • Description
        Use-case guides for modern security teams: investigate, prioritize, respond, and reduce risk.
      • SOC Modernization
      • Adversary Intelligence & Threat Hunting
      • External Exposure Management
      • Critical Infrastructure Resilience
      • Description
        Industries bring unique exposures and adversaries. Learn how Censys can help.
      • Cybersecurity
      • Energy & Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        Censys Powers SOC Modernization with Real-Time Internet Context and Risk Scoring
        Read More
  • Censys ARC Research
      • Censys ARC Research
      • Description
        Threat, vulnerability, and Internet intelligence built from expansive first-party visibility. The mission: to illuminate Internet behaviors that impact our world.
      • Censys ARC
      • Latest Research
      • Rapid Response Advisories
      • Threat Intelligence
      • Featured Post
        Under CTRL: Dissecting a Previously Undocumented Russian .Net Access Framework
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys updates on products and partnerships, plus thought leadership on Internet risk trends.
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events
      • Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        Abstract representation of a report on an orange background.
        Censys Raises $70 Million in Strategic Funding to Expand Its Internet Intelligence Platform
        Read More
  • Request Demo
  • Get Started Now
  • Login
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Platform Overview
      • Internet Map
      • Integrations
      • AI at Censys
      • Description
        Purpose-built capabilities that power security operations and exposure management.
      • Censys Search
      • Censys Enterprise
      • Adversary Investigation
      • Attack Surface Management
      • Critical Infrastructure Monitoring
      • Featured Post
        Cover page of the 2025 State of the Internet Report by Censys, featuring a world map and report title.
        The 2025 State of the Internet Report
        Read More
  • Solutions
      • Solutions
      • Description
        Use-case guides for modern security teams: investigate, prioritize, respond, and reduce risk.
      • SOC Modernization
      • Adversary Intelligence & Threat Hunting
      • External Exposure Management
      • Critical Infrastructure Resilience
      • Description
        Industries bring unique exposures and adversaries. Learn how Censys can help.
      • Cybersecurity
      • Energy & Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        Censys Powers SOC Modernization with Real-Time Internet Context and Risk Scoring
        Read More
  • Censys ARC Research
      • Censys ARC Research
      • Description
        Threat, vulnerability, and Internet intelligence built from expansive first-party visibility. The mission: to illuminate Internet behaviors that impact our world.
      • Censys ARC
      • Latest Research
      • Rapid Response Advisories
      • Threat Intelligence
      • Featured Post
        Under CTRL: Dissecting a Previously Undocumented Russian .Net Access Framework
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys updates on products and partnerships, plus thought leadership on Internet risk trends.
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events
      • Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        Abstract representation of a report on an orange background.
        Censys Raises $70 Million in Strategic Funding to Expand Its Internet Intelligence Platform
        Read More
  • Request Demo
  • Get Started Now
  • Login

Rachel Hannenberg

Abstract digital wave pattern with glowing lines representing cybersecurity and data protection in healthcare.
Blog
From Vulnerable to Vigilant: 3 Critical Actions to Protect Healthcare from Cyber Threats
A bar chart with a star icon in the center, featuring orange bars and lines on a light blue background.
Blog
Highlights from the New Unleash the Power of Censys Search Handbook
A line graph shows the rising percentage of ransomware incidents from 2015 to 2024, highlighting key tactics and trends.
Blog
Why Censys ASM Is Your Best Line of Defense Against Ransomware
A beige background features a white icon of a document with a semi-circle cutout, accompanied by labeled lines on the left.
Blog
Securing FinServ: Exploring Cybersecurity Challenges in Financial Services
Line graph comparing active "Weird Hosts" and "All Hosts" from May to June 2022, showing trends over time.
Blog
Back to the Future: How Historical Data Can Enhance Your Cyber Defenses
Network diagram showing nodes labeled with domain, certificate, and key information connected by lines.
Blog
Boost Your Threat Hunting Skills with These 5 Informative Webinars
Default Image
Blog
7 Resources to Inform Your Next Hunt for Malicious Infrastructure
Default Image
Blog
Fortifying the Chain: Gaining Visibility into Third-Party Risk
Default Image
Blog
How Asset Attribution Can Improve Your Mean-Time-to-Remediate
A digital illustration of a report or blog with connected lines on a dark background.
Blog
From Reactive to Proactive: How to Reinforce Security Compliance with Exposure Management

US: +1-888-985-5547

Intl: +1-877-438-9159

connect@censys.com

  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px
  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px

Copyright © 2026 Censys  |  Data Retention Policy  |  Terms & Conditions  |  Privacy Policy