Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/28/2020
02:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RiskIQ Creates Complimentary COVID-19 Internet Intelligence Gateway to Fight Pandemic of Cybercrime

Microsite to enable the security community during crisis.

London, UK – May 28, 2020 – RiskIQ, the global leader in attack surface management, announced the launch of the COVID-19 Internet Intelligence Gateway, a free, one-stop cybersecurity resource centre. With thousands of newly created COVID-19-related websites launching daily, the gateway accepts submissions of suspicious URLs or emails, providing a lookup service that taps into RiskIQ's massive global crawling infrastructure to analyse and compile malicious URLs related to COVID-19.

Security practitioners can lookup any suspicious COVID-19 URL via the Gateway. Submissions are crawled and analysed by RiskIQ's systems and the results sent back. Because each malicious URL is added to RiskIQ blacklists through community participation, the site will become an authoritative source of intelligence that practitioners can use to block and investigate COVID-19 scams as they increase on an unprecedented scale.

"Our goal with the Gateway is to help the security community work together in our response to the influx of criminal activity," said RiskIQ CEO Lou Manousos. "The COVID-19 Internet Intelligence Gateway will be a powerful resource for keeping organisations safe during this crisis."

FBI cybercrime reports have quadrupled, and phishing attacks surged 350% after the pandemic started. Currently, Google blocks 18 million COVID-19 scam emails daily, and RiskIQ noted 317k new websites related to COVID-19 over just two weeks.

The Gateway compiles and improves upon the catalogue of complimentary resources RiskIQ released in the early days of the pandemic to empower the cybersecurity community, which is battling a massive spike in cyber threats related to COVID-19. Users who sign up for the COVID-19 Internet Intelligence Gateway will also have access to RiskIQ's other complimentary offerings:

·         COVID-19 Daily Intelligence reports compiled by RiskIQ's agency-trained analysts. This intelligence helps improve situational awareness and inform security teams, which face new requirements during these times

·         Lists of new infrastructure related to COVID-19 observed by RiskIQ's global crawling network, updated daily. Security teams can download newly observed hosts and URL intelligence to aid in investigations and improve their organisation's security posture

·         Email Intelligence, including top subject lines to help educate users on COVID-19 scams and malware. RiskIQ analyses thousands of emails to provide crucial insights security teams can leverage toward protecting employees and customers

·         Free Digital Footprint Snapshot, a quick and easy way to understand digital assets that belong to your organisation outside the firewall so you can secure them from a spike in COVID-19-related cybercrime

·         A 30-day PassiveTotal query boost enables analysts to ramp-up their investigations of COVID-19 threats with RiskIQ's unique data sets

·         Updated COVID-19 Blacklists compiled by RiskIQ. Security teams can block these blacklists of known bad infrastructure to immediately to protect their organisation from new campaigns leveraging the COVID-19 crisis

Sign up for the RiskIQ COVID-19 Internet Intelligence Gateway here: https://www.riskiq.com/covid19-cybersecurity/sign-up/. Also, be sure to download the RiskIQ COVID-19 Chrome Extension, which allows users to submit suspect URLs, hostnames, or domains to RiskIQ for crawling purposes. Results from the crawl will show up under the submissions tab from the pop-up menu and link to a detailed report. Reports will include detailed information from the crawl, including referenced pages, screenshots, and classification of content.

About RiskIQ

RiskIQ is the leader in digital attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organisation’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, security teams, and CISO’s, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action to protect the business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures.

Try RiskIQ Community Edition for free by visiting https://www.riskiq.com/community/. To learn more about RiskIQ, visit www.riskiq.com.

© 2020 RiskIQ, Inc. All rights reserved. RiskIQ is a registered trademark of RiskIQ, Inc. in the United States and other countries. All other trademarks contained herein are the property of their respective owners.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/1/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Threat from the Internet--and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15478
PUBLISHED: 2020-07-01
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
CVE-2020-6261
PUBLISHED: 2020-07-01
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-15471
PUBLISHED: 2020-07-01
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
CVE-2020-15472
PUBLISHED: 2020-07-01
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
CVE-2020-15473
PUBLISHED: 2020-07-01
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.