The UK’s National Cyber Security Centre (NCSC), is now leading a cybersecurity mission to scan all the devices connected to internet for vulnerabilities and loopholes.
The objective of this operation is to understand and measure the UK’s vulnerability ratio against cyberattack and to enhance security of those internet connected systems.
“These activities cover any internet-accessible system that is hosted within the UK and vulnerabilities that are common or particularly important due to their high impact,” said the NCSC agency. The NCSC scans are using a cloud-hosted environment from the scanner.scanning.service.ncsc.gov.uk from IP addresses 35.177.10.231 and 18.171.7.246.
NCSC is initially testing the vulnerability probes within its own environment to identify any issues before scanning the UK internet.
“We’re not trying to find vulnerabilities in the UK for some other, nefarious purpose. We’re beginning with simple scans, and will slowly increase the complexity of the scans, explaining what we’re doing (and why we’re doing it).” mentioned Ian Levy, NCSC technical director.
The data collected from the NCSC scans will include any data shared with the connecting services and servers, such as HTTP responses including headers. There will only be a minimum amount of info required to check if the scanned device is affected by an exploit.
NCSC states if any sensitive or personal information is collected, then the agency will take steps to remove such data and prevent it being captured again in future.
The UK organizations and business can opt out of having their servers scanned by the NCSC Scans by emailing a list of IP addresses they want to be excluded from the overall internet scan conducted by the UK cybersecurity agency.
Early this year, the cybersecurity agency also started releasing NMAP scripting engine to support entities defend against any potential threats by scanning and remediating vulnerable devices on their network. The NCSC is also planning to release more nmap scripts for severe vulnerabilities that are actively targeted by threat actors.
Businesses and individuals can keep track of NCSC statements to deploy the new nmap scripts and ensure their network is secured against the new and developing threats.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…