Explore the Enhanced CrowdSec CTI Scoring System and How We Compute It
Explore CrowdSec’s enhanced CTI scoring system, now more explainable and reliable, with improved quantiles for accurate threat analysis and IP data tracking.
Data Curation
Introducing the IP Range Reputation System: Identify Organized Cyber Crime vs. Petty Criminals
IP Range Reputation provides incident response teams & threat researchers with improved visibility in low-information environments to act fast against threats.
Data Curation
Detecting VPN and Proxy Usage via IP Traffic Analysis: A Glimpse into CrowdSec’s Kaggle Challenge
We hosted a Kaggle challenge to tackle the pressing cybersecurity issue of detecting VPN and proxy traffic. Here are the key findings and takeaways.
Data Curation
Understanding the Basics of the Bayesian Bucket, How It Works and How to Use It
Bayesian reasoning has applications in cybersecurity and the detection of malicious behavior. Learn how the Bayesian bucket works and how to use it.
Data Curation
AI-Powered Proxy and VPN Detection — The CrowdSec Way
Learn how CrowdSec detects VPN and proxies using machine learning models and leveraging attack patterns exposed by IPs to improve detection.