Breaking

The UK NCSC scans internet connected devices to fortify security posture

The UK’s National Cyber Security Centre (NCSC), is now leading a cybersecurity mission to scan all the devices connected to internet for vulnerabilities and loopholes.

The objective of this operation is to understand and measure the UK’s vulnerability ratio against cyberattack and to enhance security of those internet connected systems.

The NCSC scan and protocols

“These activities cover any internet-accessible system that is hosted within the UK and vulnerabilities that are common or particularly important due to their high impact,” said the NCSC agency. The NCSC scans are using a cloud-hosted environment from the scanner.scanning.service.ncsc.gov.uk from IP addresses 35.177.10.231 and 18.171.7.246.

Source: NCSC

NCSC is initially testing the vulnerability probes within its own environment to identify any issues before scanning the UK internet.

“We’re not trying to find vulnerabilities in the UK for some other, nefarious purpose. We’re beginning with simple scans, and will slowly increase the complexity of the scans, explaining what we’re doing (and why we’re doing it).” mentioned Ian Levy, NCSC technical director.

How to opt out of this NCSC scan for vulnerability probes

The data collected from the NCSC scans will include any data shared with the connecting services and servers, such as HTTP responses including headers. There will only be a minimum amount of info required to check if the scanned device is affected by an exploit.

NCSC states if any sensitive or personal information is collected, then the agency will take steps to remove such data and prevent it being captured again in future.

The UK organizations and business can opt out of having their servers scanned by the NCSC Scans by emailing a list of IP addresses they want to be excluded from the overall internet scan conducted by the UK cybersecurity agency.

Early this year, the cybersecurity agency also started releasing NMAP scripting engine to support entities defend against any potential threats by scanning and remediating vulnerable devices on their network. The NCSC is also planning to release more nmap scripts for severe vulnerabilities that are actively targeted by threat actors.

Businesses and individuals can keep track of NCSC statements to deploy the new nmap scripts and ensure their network is secured against the new and developing threats.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago