|
Tweet Follow @spamhaus |
|
|||
![]() Update for Composite Blocklist (CBL) Users Suspicious network resurrections Spamhaus Botnet Threat Update: Q2-2020 Tracking Qbot Spamhaus Botnet Threat Update: Q1-2020 The Current State of Domain Hijacking, and a specific look at the ongoing issues at GoDaddy It was the best of times, it was the worst of times Weaponizing Domain Names: how bulk registration aids global spam campaigns Older News Articles: ![]() ![]() |
Today, The Spamhaus Project is both happy and proud to announce the official launch of the Spamhaus CERT Insight Portal. The aim of the new web portal is to help Computer Emergency Response Teams (CERTs) and Computer Security Incident Response Team (CSIRTs) with a national or regional responsibility to protect their critical infrastructure and IP address space from cyberthreats. ![]() The CERT Insight Portal, which is available for free, provides information about malware infected computers (bots) within a CERT/CSIRT area of responsibility — the specific country or region that the CERT or CSIRT is responsible for. This data set is sourced from the Spamhaus XBL. In addition, the portal contains a notification system for any new SBL and Botnet C&C listings within a CERT/CSIRT area of responsibility. Last year, Spamhaus opened the CERT Insight Portal to beta users, and it has already been a big success. More than 30 CERTs with a national responsibility are now receiving near-real-time feeds from Spamhaus, helping them to remediate infections in their country and take action against new Botnet Command & Control servers (C&Cs). CERTs and CSIRTs with national or regional responsibility can request access to the CERT Insight Portal by contacting the Spamhaus CERT Outreach team at: cert |
![]() ![]() ![]() ![]() ![]() ![]() |
![]() Permanent link to this news article: Spamhaus launches CERT Insight Portal http://www.spamhaus.org/news/article/705/spamhaus-launches-cert-insight-portal ![]() |
![]() Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record. |
|