Category: Product Updates
-
Block 50% More Attackers with the CrowdSec Threat Forecast Blocklist
Introducing our new Threat Forecast Blocklist. Learn how it works and how it can help you block around 50% more attackers before they even reach your servers.
-
Am I Under Attack: Cut Through the Noise to Detect Sophisticated and Targeted Attacks with CrowdSec’s New feature
Am I Under Attack leverages advanced AI algorithms to detect anomalies in your logs indicating more sophisticated or targeted attacks.
-
Introducing the New and Advanced IP Lookup Search
In a previous article, we introduced the CTI Report, this time, we are taking it a step further and introducing new and advanced search options for our IP lookup. You now have access to multiple search options to accurately and effectively explore the CrowdSec CTI. Let’s take a look. IP lookup search These new search…
-
Discover CrowdSec’s Free Third-Party Blocklists
In case you missed it, we recently announced the new Blocklists Catalog in the CrowdSec Console. In the catalog, you can find several blocklists centralized in one place, including third-party blocklists that are free to all users. All users on the CrowdSec Console can subscribe their Security Engines to third-party blocklists to secure their systems…
-
Streamlining ELK Stack with CrowdSec via Syslog
By integrating CrowdSec with the ELK stack via Syslog, you can enhance your security monitoring capabilities and bolster your threat detection mechanisms.
-
Enabling Threat Hunting and Analysis with the Revamped CrowdSec CTI Report
We are introducing a much-needed revamp of the CrowdSec CTI report to empower threat hunters and analysts to swiftly locate vital threat information.
-
Explore CrowdSec Blocklists with the New Blocklist Catalog
Introducing a centralized hub to explore and compare the CrowdSec Blocklists, helping you select the most relevant to your security needs.
-
Introducing the New Cloudflare Remediation Component
Try the new Cloudflare Remediation Component and see the difference it can make in elevating the security of your website.
-
Simplify Threat Detection with Alert Context
Understanding the triggers behind a security alert is crucial for smooth security operations and simplifying threat detection.
-
How to Detect Successful SSH Brute Force Attacks
Detect successful SSH brute force attacks effectively with advanced security tools and proactive monitoring measures. Protect your systems from unauthorized access.