How is AI Changing the Threat Landscape?
Get the eBook
Censys logo with white text and circular design elements on a black background.
Censys logo featuring a circular icon with lines and the word "censys" in lowercase letters.
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Censys Platform
      • Internet Map
      • AI at Censys
      • Featured Post
        A digital illustration of a bar chart with a data point scatter pattern on a dark background.
        2025 State of the Internet: Introduction
        Read More
  • Solutions
      • Solutions
      • Description
        Powerful solutions that deliver end to end value for every type of security professional.
      • Censys Search
      • Security Operations and Triage
      • Attack Surface Management
      • Threat Hunting
      • Critical Infrastructure
      • Featured Post
        A technician in safety gear inspects a critical infrastructure control panel with a laptop in hand.
        Press Release: Censys Enhances Critical Infrastructure Protection with Unmatched Internet Visibility
        Read More
  • Industries
      • Industries
      • Description
        See how Censys empowers security teams across industries.
      • Cybersecurity
      • Energy and Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        A digital illustration of a server or data storage device with connected lines on a dark background.
        Unpacking the Oracle EBS Debacle: Industries, Geography, and MOVEit Comparisons
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys thought leadership on threat hunting, attack surface management, and industry trends.
      • Security Advisories
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events and Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        A digital illustration of a resource icon with a star symbol on a blue background.
        Accelerating Security Response with CensAI™
        Read More
  • Request Demo
  • Get Started Now
  • Login
  • Platform
      • Platform
      • Description
        The one place to understand and act on everything on the Internet.
      • Censys Platform
      • Internet Map
      • AI at Censys
      • Featured Post
        A digital illustration of a bar chart with a data point scatter pattern on a dark background.
        2025 State of the Internet: Introduction
        Read More
  • Solutions
      • Solutions
      • Description
        Powerful solutions that deliver end to end value for every type of security professional.
      • Censys Search
      • Security Operations and Triage
      • Attack Surface Management
      • Threat Hunting
      • Critical Infrastructure
      • Featured Post
        A technician in safety gear inspects a critical infrastructure control panel with a laptop in hand.
        Press Release: Censys Enhances Critical Infrastructure Protection with Unmatched Internet Visibility
        Read More
  • Industries
      • Industries
      • Description
        See how Censys empowers security teams across industries.
      • Cybersecurity
      • Energy and Utilities
      • Financial Services
      • Government
      • Healthcare
      • Featured Post
        A digital illustration of a server or data storage device with connected lines on a dark background.
        Unpacking the Oracle EBS Debacle: Industries, Geography, and MOVEit Comparisons
        Read More
  • Resources
      • Resources
      • Description
        Explore Censys thought leadership on threat hunting, attack surface management, and industry trends.
      • Security Advisories
      • Blog
      • Resource Hub
      • Integrations
      • Case Studies
      • Events and Webinars
      • Pricing
      • Developers
      • Glossary
      • Documentation
      • Community
  • Company
      • Company
      • Description
        Learn more about the Censys mission and the talented team behind it.
      • About Us
      • Leadership
      • Glossary
      • Our Customers
      • Partners
      • Careers
      • -
        A digital illustration of a resource icon with a star symbol on a blue background.
        Accelerating Security Response with CensAI™
        Read More
  • Request Demo
  • Get Started Now
  • Login

Critical Infrastructure

Abstract circular diagram with a star-shaped element on the left and a horizontal line extending to the right.
Blog
Lives on the Line: Hidden Risks in Critical National Infrastructure
Four bar charts display six-month trends in host counts for Unitronics, Orpak SiteOmat, Red Lion, and Tridium Niagara from
Blog
ICS and Iran: Exposure of Previously Targeted Devices
A control panel with various indicators, including temperature gauges, switches, and status icons, under a blue "Misc.
Blog
Turning Off the (Information) Flow: Working With the EPA to Secure Hundreds of Exposed Water HMIs
A diagram with a large letter D and connected lines, illustrating a resource or data structure.
Blog
Salt Typhoon Attacks Highlight Need for Advanced Defenses
A telecommunications tower with a digital, circular pattern overlay representing cybersecurity and signal protection.
Blog
Securing the Signal and Protecting the Grid: Facing the Cybersecurity Risks Across Telecom
Blueprint-style illustration of interconnected pipes and valves representing critical infrastructure security.
Blog
Global ICS Exposures: What Our 2024 State of the Internet Report Reveals About Critical Infrastructure Security
Red background with "You Have Been Hacked" message, a map of Palestine, and a blue Star of David symbol.
Blog
Water ICS Exposures Highlight Vulnerabilities in Critical Infrastructure Security
A table displays the number of mobile devices by brand across Kenya, South Africa, Mauritius, and Zambia as of February 20,
Blog
Potential Chinese Influence on African IT Infrastructure
A stylized infographic with a central star icon and connected bullet points on an orange background.
Blog
One Year Later: 3 Insights Into the Colonial Pipeline Attack and Gas & Oil Critical Infrastructure
Default Image
Blog
Why Internet-connected OT infrastructure presents a security risk to company data
Censys logo with white text and circular design elements on a black background.

US: +1-888-985-5547

Intl: +1-877-438-9159

connect@censys.com

  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px
  • Why Censys
    • Censys Platform
    • Censys Search
    • AI at Censys
    • Threat Hunting
    • Attack Surface Management
    • Censys for Government
    • Partners
    • Request Demo
  • Explore
    • Careers
    • Security Advisories
    • Blog
    • Contact Us
    • Community
    • Documentation
    • Pricing
  • Popular
    • 2025 State of the Internet Report
    • Cloud Security Assessment Tools
    • Infrastructure Monitoring
    • Vulnerability Management Tools
    • Top Ransomware Attack Vectors
    • Attack Surface Mapping

Subscribe to our newsletter

  • Youtube
  • Linkedin
  • X
  • 500px

Copyright © 2026 Censys  |  Data Retention Policy  |  Terms & Conditions  |  Privacy Policy