Thursday, May 8, 2025
HomeCyber Security NewsCISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops

CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops

Published on

SIEM as a Service

Follow Us on Google News

 The Cybersecurity and Infrastructure Security Agency (CISA) has alerted its threat hunting teams to immediately discontinue use of two widely trusted cyber threat intelligence tools, Censys and VirusTotal.

The notification, sent to hundreds of CISA staffers this week, marks a significant shift in the agency’s operational approach as it contends with internal budget reductions and mounting political scrutiny.

According to internal correspondence seen by Nextgov/FCW and confirmed by two people familiar with the matter, CISA’s threat hunting division ceased using Censys, an internet scanning and threat analysis platform, late last month.

- Advertisement - Google News

The tool proved essential for mapping cyber threat activity across networks. Additionally, all use of Google-owned VirusTotal — a staple for malware and suspicious file analysis — is set to end by April 20.

CISA’s email to over 500 cyber threat hunters acknowledged the move could impact operations, stating, “We understand the importance of these tools in our operations and are actively exploring alternative tools to ensure minimal disruption. We are confident that we will find suitable alternatives soon.”

So far, CISA, Google, and Censys have declined public comment.

Contractor Cuts and Broader Downsizing

Alongside these tool retirements, CISA’s contractor workforce is also feeling the squeeze.

According to sources, Nightwing and Peraton contractors were ordered to return agency phones, a move presaging a significant reduction in private-sector support. This follows reports of anticipated broad-scale cuts to CISA contracts, particularly those dedicated to threat hunting.

These changes come as CISA faces scrutiny from the Trump administration and congressional Republicans, who have argued the agency has overreached in its fight against online disinformation, including accusations of bias against conservative viewpoints.

Homeland Security Secretary Kristi Noem has publicly supported downsizing the agency, pushing for a tighter focus on defending critical infrastructure rather than content moderation.

This week’s developments have stoked concerns across the U.S. cybersecurity sector.

In a related incident, internal MITRE correspondence leaked online suggested CISA would withdraw support for the globally critical Common Vulnerabilities and Exposures (CVE) Program — a decision the agency quickly reversed following public outcry.

CISA, established in 2018 to safeguard America’s digital and physical infrastructure, finds itself at a crossroads.

With major threat hunting capabilities in flux and its mission under renewed review, cybersecurity experts warn that the loss of proven tools like Censys and VirusTotal could hamper the agency’s ability to identify and neutralize threats—a critical function as cyberattacks on federal networks remain at historically high levels.

For now, CISA assures it is working to identify new solutions, but many inside and outside the agency fear critical gaps could emerge during this transition.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...