Want to improve the security of your ecommerce website?

Learn how
Enabling Threat Hunting and Analysis with the Revamped CrowdSec CTI Report
Product Updates

Enabling Threat Hunting and Analysis with the Revamped CrowdSec CTI Report

We are introducing a much-needed revamp of the CrowdSec CTI report to empower threat hunters and analysts to swiftly locate vital threat information.

Introducing the New CrowdSec and BunkerWeb Integration
Announcement

Introducing the New CrowdSec and BunkerWeb Integration

We are thrilled to welcome BunkerWeb into the CrowdSec Network and together strengthen collaborative open security for both our communities.

Revolutionizing Security Analysis with CrowdSec and Microsoft Copilot for Security
Announcement

Revolutionizing Security Analysis with CrowdSec and Microsoft Copilot for Security

We are announcing the CrowdSec CTI and Microsoft Copilot for Security integration, which signals a new era of collaborative and intelligent security operations.

Building a Network for Small Businesses Part 3: Attack Scenarios
Guest Post

Building a Network for Small Businesses Part 3: Attack Scenarios

In part 3 of this series, Péter walks you through implementing and testing attack scenarios to protect networks for small businesses.

Building a Network for Small Businesses Part 2: Running Configurations
Guest Post

Building a Network for Small Businesses Part 2: Running Configurations

In part 2 of this series, Peter dives into running configurations on the firewall, with explanations of the design decisions made for each service.

Building a Network for Small Businesses Part 1: Hardware
Guest Post

Building a Network for Small Businesses Part 1: Hardware

Learn how to build, test, and secure networks with CrowdSec for small businesses to achieve a more affordable firewall and router combination.

Network Effect x AI: Transforming CTI into Tactical Threat Intelligence
Inside CrowdSec

Network Effect x AI: Transforming CTI into Tactical Threat Intelligence

Delve into IP-based cyber defense and explore how the Network Effect and AI are transforming CTI into crowd-powered Tactical Threat Intelligence.

Explore CrowdSec Blocklists with the New Blocklist Catalog
Product Updates

Explore CrowdSec Blocklists with the New Blocklist Catalog

Introducing a centralized hub to explore and compare the CrowdSec Blocklists, helping you select the most relevant to your security needs.

Scalable and Low-Friction Authentication for MSSPs with the CrowdSec IDPS
Use Case

Scalable and Low-Friction Authentication for MSSPs with the CrowdSec IDPS

Scaling can be an issue for smaller teams. See how we helped an MSSP user achieve scalable & low-friction authentication in 30 minutes with the CrowdSec IDPS.

Securing A Multi-Server CrowdSec Security Engine Installation With HTTPS
Tutorial

Securing A Multi-Server CrowdSec Security Engine Installation With HTTPS

In part II of this series, you learn about the three different ways to achieve secure TLS communications between your CrowdSec Security Engines in a multi-server setup.

Setting up A Multi-Server CrowdSec Security Engine Installation
Tutorial

Setting up A Multi-Server CrowdSec Security Engine Installation

In part I of this series, you learn how to deploy multiple Security Engines in a multi-server setup with one of the servers configured to store and share the collected signals.

Crédit Mutuel Arkéa Relies on CrowdSec and Crowd-Powered Intelligence to Block Malicious IPs
Use Case

Crédit Mutuel Arkéa Relies on CrowdSec and Crowd-Powered Intelligence to Block Malicious IPs

Crédit Mutuel Arkéa, the leading bancassurance group in France, uses the CrowdSec Security Stack to protect its systems against malicious traffic.

New Surge in VMware Workspace ONE Vulnerability CVE-2022-22954 Exploit Attempts Detected
Vulnerabilities

New Surge in VMware Workspace ONE Vulnerability CVE-2022-22954 Exploit Attempts Detected

A recent surge in CVE-2022-22954 exploitation attempts detected by the CrowdSec Network points to a potential new botnet using common vulnerabilities.

Introducing the IP Range Reputation System: Identify Organized Cyber Crime vs. Petty Criminals
Data Curation

Introducing the IP Range Reputation System: Identify Organized Cyber Crime vs. Petty Criminals

IP Range Reputation provides incident response teams & threat researchers with improved visibility in low-information environments to act fast against threats.

the foss business model presents open source as the digital twin of fair trade
Inside CrowdSec

The CrowdSec FOSS Business Model: Open Source as the Digital Twin of Fair Trade

For us, the FOSS business model is about creating enterprise-grade open-source software while aligning community, investor, and client interests.

Detecting VPN and Proxy Usage via IP Traffic Analysis: A Glimpse into CrowdSec’s Kaggle Challenge
Data Curation

Detecting VPN and Proxy Usage via IP Traffic Analysis: A Glimpse into CrowdSec’s Kaggle Challenge

We hosted a Kaggle challenge to tackle the pressing cybersecurity issue of detecting VPN and proxy traffic. Here are the key findings and takeaways.

Protect TCP/UDP Ports Against DDoS Attacks with CrowdSec and Traefik Proxy
Tutorial

Protect TCP/UDP Ports Against DDoS Attacks with CrowdSec and Traefik Proxy

Learn how to secure a TCP/UDP port and protect your services against DDoS attacks using CrowdSec and Traefik Proxy.

Announcing the Release of the CrowdSec Security Engine 1.6
Announcement

Announcing the Release of the CrowdSec Security Engine 1.6

The Security Engine 1.6 is in general availability and it comes with exciting new features and improvements, including the new AppSec Component.

cybersecurity in healthcare sector
Proactive Cybersecurity

4 Ways to Strengthen Cybersecurity Posture in the Healthcare Industry in 2024

Clinics and hospitals are among the most targeted institutions for cyberattacks. Here are 4 ways to improve cybersecurity posture in healthcare.

Monitoring CrowdSec with Prometheus and Grafana
Tutorial

Monitoring CrowdSec with Prometheus and Grafana

Monitor CrowdSec with Prometheus & Grafana to ensure optimal performance of your Security Engines and protection for your online infrastructure.

Enhance Docker Compose Security with CrowdSec and Traefik Proxy
Tutorial

Enhance Docker Compose Security with CrowdSec and Traefik Proxy

How have you been managing your Docker security without analyzing data? Learn how to enhance your Docker Compose security in this tutorial.