Achieve security excellence without breaking the budget!

Download guide

Data Curation

explore how we compute the enhanced crowdsec cti scoring systems
Data Curation

Explore the Enhanced CrowdSec CTI Scoring System and How We Compute It

Explore CrowdSec’s enhanced CTI scoring system, now more explainable and reliable, with improved quantiles for accurate threat analysis and IP data tracking.

Introducing the IP Range Reputation System: Identify Organized Cyber Crime vs. Petty Criminals
Data Curation

Introducing the IP Range Reputation System: Identify Organized Cyber Crime vs. Petty Criminals

IP Range Reputation provides incident response teams & threat researchers with improved visibility in low-information environments to act fast against threats.

Detecting VPN and Proxy Usage via IP Traffic Analysis: A Glimpse into CrowdSec’s Kaggle Challenge
Data Curation

Detecting VPN and Proxy Usage via IP Traffic Analysis: A Glimpse into CrowdSec’s Kaggle Challenge

We hosted a Kaggle challenge to tackle the pressing cybersecurity issue of detecting VPN and proxy traffic. Here are the key findings and takeaways.

Understanding the Basics of the Bayesian Bucket, How It Works and How to Use It
Data Curation

Understanding the Basics of the Bayesian Bucket, How It Works and How to Use It

Bayesian reasoning has applications in cybersecurity and the detection of malicious behavior. Learn how the Bayesian bucket works and how to use it.

AI-Powered Proxy and VPN Detection — The CrowdSec Way
Data Curation

AI-Powered Proxy and VPN Detection — The CrowdSec Way

Learn how CrowdSec detects VPN and proxies using machine learning models and leveraging attack patterns exposed by IPs to improve detection.