Breaking

The UK NCSC scans internet connected devices to fortify security posture

The UK’s National Cyber Security Centre (NCSC), is now leading a cybersecurity mission to scan all the devices connected to internet for vulnerabilities and loopholes.

The objective of this operation is to understand and measure the UK’s vulnerability ratio against cyberattack and to enhance security of those internet connected systems.

The NCSC scan and protocols

“These activities cover any internet-accessible system that is hosted within the UK and vulnerabilities that are common or particularly important due to their high impact,” said the NCSC agency. The NCSC scans are using a cloud-hosted environment from the scanner.scanning.service.ncsc.gov.uk from IP addresses 35.177.10.231 and 18.171.7.246.

Source: NCSC

NCSC is initially testing the vulnerability probes within its own environment to identify any issues before scanning the UK internet.

“We’re not trying to find vulnerabilities in the UK for some other, nefarious purpose. We’re beginning with simple scans, and will slowly increase the complexity of the scans, explaining what we’re doing (and why we’re doing it).” mentioned Ian Levy, NCSC technical director.

How to opt out of this NCSC scan for vulnerability probes

The data collected from the NCSC scans will include any data shared with the connecting services and servers, such as HTTP responses including headers. There will only be a minimum amount of info required to check if the scanned device is affected by an exploit.

NCSC states if any sensitive or personal information is collected, then the agency will take steps to remove such data and prevent it being captured again in future.

The UK organizations and business can opt out of having their servers scanned by the NCSC Scans by emailing a list of IP addresses they want to be excluded from the overall internet scan conducted by the UK cybersecurity agency.

Early this year, the cybersecurity agency also started releasing NMAP scripting engine to support entities defend against any potential threats by scanning and remediating vulnerable devices on their network. The NCSC is also planning to release more nmap scripts for severe vulnerabilities that are actively targeted by threat actors.

Businesses and individuals can keep track of NCSC statements to deploy the new nmap scripts and ensure their network is secured against the new and developing threats.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

4 days ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

1 week ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

1 week ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

1 week ago

Scalefusion MDM Alternatives: Top 5 Scalefusion Alternatives for IT Decision Makers

Discover the top 5 Scalefusion alternatives for MDM, offering better features, scalability, and integration for…

2 weeks ago

Okta Vs OneLogin: A Detailed Comparison

Compare Okta and OneLogin: a detailed guide on features, pricing, customer base, security, and more…

1 month ago