Explore The Next Frontier in Cyber Threats and Defense Evolution!

Download ebook

Welcome to the CrowdSec Blog

Learn more about CrowdSec, our approach to tactical intelligence, and company news.

how to protect your digital assets against ai crawlers
Announcement

Protect Your Digital Assets Against AI Crawlers

Let’s explore some of the most abusive AI crawler behaviors and learn how to block them using the CrowdSec AI Crawlers Blocklist.

Emanuel Seemann
announcing the release of the multimodal offensive artificial intelligence ebook
Announcement

Multimodal Offensive AI: The Next Frontier in Offensive AI and A Wake-Up Call for Cybersecurity

The Multimodal Offensive AI ebook explores the next evolutionary step of offensive AI. Understand this next evolution of cyber threats and how you can prepare.

Philippe Humeau
how to waste attacker resources and protect applications
Tutorial

How to Waste Attacker Resources and Protect Your Applications in One Go

Discover the power of SpiderTrap Sinkholes combined with CrowdSec in this step-by-step guide to protect your applications and exhaust attackers’ resources.

Laurence Jones
enhance kubernetes security with the crowdsec waf
Tutorial

Enhance Kubernetes Security with the CrowdSec WAF

Learn how to enhance the security of your Kubernetes applications with the CrowdSec WAF, using custom rules to block specific attack vectors.

Hamza Essahely
crowdsec threat forecast blocklist release announcement
Announcement

Block 50% More Attackers with the CrowdSec Threat Forecast Blocklist

Introducing our new Threat Forecast Blocklist. Learn how it works and how it can help you block around 50% more attackers before they even reach your servers.

Emanuel Seemann
the value of preemptively blocking an a cyber attack
Proactive Cybersecurity

The Real Value of Preemptively Blocking a Cyber Attack

Preemptively blocking malicious IPs is not just good for your security posture, it’s also good for your wallet.  In this article, I’ll explain how you can track remediation metrics using your CrowdSec Security Engine and how you can estimate the actual cost savings enabled by the CrowdSec Blocklists. Remediation Component metrics With the release of […]

Emanuel Seemann
post-exploitation behavior detection on windows with crowdsec and sigmahq
Integrations

Improving Post-Exploitation Behavior Detection on Windows with SigmaHQ

Introducing the integration of SigmaHQ into the CrowdSec Security Engine to further improve post-exploitation behavior detection on Windows.

Thibault Koechlin
guide to cost-effective security operations
Announcement

Introducing The CrowdSec Guide to Cost-Effective Security Operations

Reduce cybersecurity costs while boosting efficiency with the CrowdSec Guide to Cost-Effective Security Operations. Learn strategies backed by real-world data!

Jerome Clauzade
crowdsec and suse partnership
Announcement

CrowdSec on SUSE: Enhancing Security with Collaborative Defense

Protect SUSE Linux with CrowdSec’s community-driven Security Engine, open source, behavior-based threat detection with real-time crowdsourced intelligence.

Jean Devaux
websupport and crowdsec waf
Use Case

How Websupport Enhances Customer Web Security with the CrowdSec WAF

Learn how Websupport leverages the CrowdSec WAF to enhance web security for their customers without any configuration and workflow changes.

The CrowdSec Team
Le Monde Uses CrowdSec to Automate Protection of Internet-Facing Resources and Maximize Operational Efficiency
Use Case

Le Monde Uses CrowdSec to Automate Protection of Internet-Facing Resources and Maximize Operational Efficiency

Le Monde, one of the most prestigious news organizations, utilizes CrowdSec to enhance their security, reduce operational costs, and supercharge efficiency.

The CrowdSec Team
explore how we compute the enhanced crowdsec cti scoring systems
Data Curation

Explore the Enhanced CrowdSec CTI Scoring System and How We Compute It

Explore CrowdSec’s enhanced CTI scoring system, now more explainable and reliable, with improved quantiles for accurate threat analysis and IP data tracking.

Emanuel Seemann
3 reasons to handle application security with crowdsec waf
Proactive Cybersecurity

3 Reasons to Handle Your Application Security with CrowdSec WAF

The CrowdSec WAF is a powerful solution that combines the classic benefits of a WAF with CrowdSec’s unique crowd-powered and behavior-based approach

Julien Devouassoud
am i under attack
Product Updates

Am I Under Attack: Cut Through the Noise to Detect Sophisticated and Targeted Attacks with CrowdSec’s New feature

Am I Under Attack leverages advanced AI algorithms to detect anomalies in your logs indicating more sophisticated or targeted attacks.

Matthieu Beauvin
minimize security risks and optimize resources with crowdsec and check point
Partners

How to Minimize Security Risks and Optimize Resources with CrowdSec and Check Point

Discover how CrowdSec’s blocklists seamlessly integrate with Check Point’s firewall to minimize cyber intrusions and save firewall load times.

Paige Jenkins
7 key aspects to consider for effective cloud detection and response
Proactive Cybersecurity

7 Key Aspects to Consider for Effective Cloud Detection and Response

Effective CDR isn’t just about spotting and reacting to threats but also creating a proactive strategy that keeps your cloud infrastructure safe and resilient.

Sebastien Blot
new and advanced ip lookup search
Product Updates

Introducing the New and Advanced IP Lookup Search

In a previous article, we introduced the CTI Report, this time, we are taking it a step further and introducing new and advanced search options for our IP lookup.  You now have access to multiple search options to accurately and effectively explore the CrowdSec CTI.   Let’s take a look. IP lookup search These new search […]

Kevin Kadosh
how can an attacker execute malware through script
Vulnerabilities

How Can an Attacker Execute Malware through a Script

Learn how script-based attacks work, why it is difficult for traditional antivirus software to detect them, and how to properly detect and mitigate this threat.

Kevin Kadosh
how to improve ecommerce security and reduce operational costs
Guest Post

How to Improve Ecommerce Security and Reduce Operational Costs

In this article, we explore methods on how to improve ecommerce security, combat bots, block bad traffic, and cut your overall operational costs.

Kamil Czujowski
ingress traffic vs egress traffic
Proactive Cybersecurity

Securing Ingress Traffic Vs. Egress Traffic: A Retrospective

In this article, we shed some light on the ingress traffic vs. egress traffic paradigm and how CISO’s focus shifted from securing servers to securing users.

Philippe Humeau
scalecommerce plummets operational costs and skyrockets efficiency with crowdsec
Use Case

ScaleCommerce Uses CrowdSec to Plummet Operational Costs and Skyrocket Efficiency

ScaleCommerce, a leading provider of high-performance and secure online shop solutions, uses CrowdSec to reduce operational costs and supercharge efficiency.

The CrowdSec Team