Achieve security excellence without breaking the budget!

Download guide

Announcing the Release of the CrowdSec Security Engine 1.6
Announcement

Announcing the Release of the CrowdSec Security Engine 1.6

The Security Engine 1.6 is in general availability and it comes with exciting new features and improvements, including the new AppSec Component.

cybersecurity in healthcare sector
Proactive Cybersecurity

4 Ways to Strengthen Cybersecurity Posture in the Healthcare Industry in 2024

Clinics and hospitals are among the most targeted institutions for cyberattacks. Here are 4 ways to improve cybersecurity posture in healthcare.

Monitoring CrowdSec with Prometheus and Grafana
Tutorial

Monitoring CrowdSec with Prometheus and Grafana

Monitor CrowdSec with Prometheus & Grafana to ensure optimal performance of your Security Engines and protection for your online infrastructure.

Enhance Docker Compose Security with CrowdSec and Traefik Proxy
Tutorial

Enhance Docker Compose Security with CrowdSec and Traefik Proxy

How have you been managing your Docker security without analyzing data? Learn how to enhance your Docker Compose security in this tutorial.

Detect and Block Port Scanning on pfSense with CrowdSec
Integrations

Detect and Block Port Scanning on pfSense with CrowdSec

Learn how to install a CrowdSec package in a pfSense firewall to block incoming packets before they enter your internal network.

The Importance of IDS and IPS When Exposing RDP Port 3389
Use Case

The Importance of IDS and IPS When Exposing RDP Port 3389

CrowdSec Partner Abdallah Toutoungi, CyberShield, explains the importance of IDS and IPS in safeguarding a system against malicious actors.

Introducing the New Cloudflare Remediation Component
Product Updates

Introducing the New Cloudflare Remediation Component

Try the new Cloudflare Remediation Component and see the difference it can make in elevating the security of your website.

Using CrowdSec to Block Unwanted Outbound Behavior
Guest Post

Using CrowdSec to Block Unwanted Outbound Behavior

CrowdSec Ambassador Viktoria Rei Bauer, shares her story on testing CrowdSec as a way to block unwanted outbound behavior.

Detect and Block Post-Exploitation Attempts
Tutorial

Detect and Block Post-Exploitation Attempts

Learn how you can detect and block an attacker running a backdoor after exploiting a vulnerability in a web application.

Through Smoke and Fire
Inside CrowdSec

Through Smoke and Fire

While working on some new features for CrowdSec, we also have been experimenting with scenarios focused on post-exploitation behaviors, relying on auditd for Linux. That experiment led to another…how quickly can a machine get compromised? How fast can the CrowdSec network spot this compromised machine? And, how fast will it make its way to the crowdsourced blocklist? This article will answer all these questions and more!

protect your websites with crowdsec and nginx proxy manager
Tutorial

Protect Your Websites with CrowdSec and Nginx Proxy Manager

Follow this tutorial and learn how to add an extra layer of protection to your websites with Nginx Proxy Manager and CrowdSec.

Monitoring Suspicious Behavior on Shared Hosting Platforms
Tutorial

Monitoring Suspicious Behavior on Shared Hosting Platforms

There are many risks associated with running a shared hosting service. Learn how to monitor and proactively mitigate some of these risks using CrowdSec.

Reduce Alert Fatigue and Optimize Decision-Making with CrowdSec CTI Helpers
Tutorial

Reduce Alert Fatigue and Optimize Decision-Making with CrowdSec CTI Helpers

Direct access to the CrowdSec CTI through the Security Engine helps you reduce alert fatigue, optimize triage, and make better and faster decisions.

detect looney tunables exploitation attempts
Vulnerabilities

Detect Exploitation Attempts of the Looney Tunables Vulnerability in Your System

Brute force attacks are the most prevalent way to exploit the Looney Tunables vulnerability in your system. Here’s how to get notified of such attempts.

a guide to continuous deployment for enhanced security
Tutorial

A Guide to Continuous Deployment for the Overly Suspicious

Explore a comprehensive guide to Continuous Deployment strategies and tools for enhanced security integration.

Understanding the Basics of the Bayesian Bucket, How It Works and How to Use It
Data Curation

Understanding the Basics of the Bayesian Bucket, How It Works and How to Use It

Bayesian reasoning has applications in cybersecurity and the detection of malicious behavior. Learn how the Bayesian bucket works and how to use it.

The Curious Case of Netgear RCE and How Vulnerabilities Persist in the Wild
Inside CrowdSec

The Curious Case of Netgear RCE and How Vulnerabilities Persist in the Wild

We report on the Netgear RCE, provide data on the exploit, show how the exploit works in practice, and speculate on vulnerability still persist in the wild.

Simplify Threat Detection with Alert Context
Product Updates

Simplify Threat Detection with Alert Context

Understanding the triggers behind a security alert is crucial for smooth security operations and simplifying threat detection.

Black Hat USA 2023 and DEF CON 31 Wrap-Up: The Critical Role of Cybersecurity in the Future of AI

Black Hat USA 2023 and DEF CON 31 Wrap-Up: The Critical Role of Cybersecurity in the Future of AI

Highlights from Black Hat USA 23 & DEF CON 31 include the critical role of cybersecurity professionals in AI policymaking and the need for global collaboration.

How to Secure Ingress Traffic for a Fleet of Servers
Tutorial

How to Secure Ingress Traffic for a Fleet of Servers

Follow this walkthrough and learn how to levarage real-ime Decision Management and manage ingress traffic for a fleet of servers.

AI-Powered Proxy and VPN Detection — The CrowdSec Way
Data Curation

AI-Powered Proxy and VPN Detection — The CrowdSec Way

Learn how CrowdSec detects VPN and proxies using machine learning models and leveraging attack patterns exposed by IPs to improve detection.