Breaking

The UK NCSC scans internet connected devices to fortify security posture

The UK’s National Cyber Security Centre (NCSC), is now leading a cybersecurity mission to scan all the devices connected to internet for vulnerabilities and loopholes.

The objective of this operation is to understand and measure the UK’s vulnerability ratio against cyberattack and to enhance security of those internet connected systems.

The NCSC scan and protocols

“These activities cover any internet-accessible system that is hosted within the UK and vulnerabilities that are common or particularly important due to their high impact,” said the NCSC agency. The NCSC scans are using a cloud-hosted environment from the scanner.scanning.service.ncsc.gov.uk from IP addresses 35.177.10.231 and 18.171.7.246.

Source: NCSC

NCSC is initially testing the vulnerability probes within its own environment to identify any issues before scanning the UK internet.

“We’re not trying to find vulnerabilities in the UK for some other, nefarious purpose. We’re beginning with simple scans, and will slowly increase the complexity of the scans, explaining what we’re doing (and why we’re doing it).” mentioned Ian Levy, NCSC technical director.

How to opt out of this NCSC scan for vulnerability probes

The data collected from the NCSC scans will include any data shared with the connecting services and servers, such as HTTP responses including headers. There will only be a minimum amount of info required to check if the scanned device is affected by an exploit.

NCSC states if any sensitive or personal information is collected, then the agency will take steps to remove such data and prevent it being captured again in future.

The UK organizations and business can opt out of having their servers scanned by the NCSC Scans by emailing a list of IP addresses they want to be excluded from the overall internet scan conducted by the UK cybersecurity agency.

Early this year, the cybersecurity agency also started releasing NMAP scripting engine to support entities defend against any potential threats by scanning and remediating vulnerable devices on their network. The NCSC is also planning to release more nmap scripts for severe vulnerabilities that are actively targeted by threat actors.

Businesses and individuals can keep track of NCSC statements to deploy the new nmap scripts and ensure their network is secured against the new and developing threats.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago