Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/28/2020
02:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RiskIQ Creates Complimentary COVID-19 Internet Intelligence Gateway to Fight Pandemic of Cybercrime

Microsite to enable the security community during crisis.

London, UK – May 28, 2020 – RiskIQ, the global leader in attack surface management, announced the launch of the COVID-19 Internet Intelligence Gateway, a free, one-stop cybersecurity resource centre. With thousands of newly created COVID-19-related websites launching daily, the gateway accepts submissions of suspicious URLs or emails, providing a lookup service that taps into RiskIQ's massive global crawling infrastructure to analyse and compile malicious URLs related to COVID-19.

Security practitioners can lookup any suspicious COVID-19 URL via the Gateway. Submissions are crawled and analysed by RiskIQ's systems and the results sent back. Because each malicious URL is added to RiskIQ blacklists through community participation, the site will become an authoritative source of intelligence that practitioners can use to block and investigate COVID-19 scams as they increase on an unprecedented scale.

"Our goal with the Gateway is to help the security community work together in our response to the influx of criminal activity," said RiskIQ CEO Lou Manousos. "The COVID-19 Internet Intelligence Gateway will be a powerful resource for keeping organisations safe during this crisis."

FBI cybercrime reports have quadrupled, and phishing attacks surged 350% after the pandemic started. Currently, Google blocks 18 million COVID-19 scam emails daily, and RiskIQ noted 317k new websites related to COVID-19 over just two weeks.

The Gateway compiles and improves upon the catalogue of complimentary resources RiskIQ released in the early days of the pandemic to empower the cybersecurity community, which is battling a massive spike in cyber threats related to COVID-19. Users who sign up for the COVID-19 Internet Intelligence Gateway will also have access to RiskIQ's other complimentary offerings:

·         COVID-19 Daily Intelligence reports compiled by RiskIQ's agency-trained analysts. This intelligence helps improve situational awareness and inform security teams, which face new requirements during these times

·         Lists of new infrastructure related to COVID-19 observed by RiskIQ's global crawling network, updated daily. Security teams can download newly observed hosts and URL intelligence to aid in investigations and improve their organisation's security posture

·         Email Intelligence, including top subject lines to help educate users on COVID-19 scams and malware. RiskIQ analyses thousands of emails to provide crucial insights security teams can leverage toward protecting employees and customers

·         Free Digital Footprint Snapshot, a quick and easy way to understand digital assets that belong to your organisation outside the firewall so you can secure them from a spike in COVID-19-related cybercrime

·         A 30-day PassiveTotal query boost enables analysts to ramp-up their investigations of COVID-19 threats with RiskIQ's unique data sets

·         Updated COVID-19 Blacklists compiled by RiskIQ. Security teams can block these blacklists of known bad infrastructure to immediately to protect their organisation from new campaigns leveraging the COVID-19 crisis

Sign up for the RiskIQ COVID-19 Internet Intelligence Gateway here: https://www.riskiq.com/covid19-cybersecurity/sign-up/. Also, be sure to download the RiskIQ COVID-19 Chrome Extension, which allows users to submit suspect URLs, hostnames, or domains to RiskIQ for crawling purposes. Results from the crawl will show up under the submissions tab from the pop-up menu and link to a detailed report. Reports will include detailed information from the crawl, including referenced pages, screenshots, and classification of content.

About RiskIQ

RiskIQ is the leader in digital attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organisation’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, security teams, and CISO’s, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action to protect the business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures.

Try RiskIQ Community Edition for free by visiting https://www.riskiq.com/community/. To learn more about RiskIQ, visit www.riskiq.com.

© 2020 RiskIQ, Inc. All rights reserved. RiskIQ is a registered trademark of RiskIQ, Inc. in the United States and other countries. All other trademarks contained herein are the property of their respective owners.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27605
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 uses Ghostscript for processing of uploaded EPS documents, and consequently may be subject to attacks related to a "schwache Sandbox."
CVE-2020-27606
PUBLISHED: 2020-10-21
BigBlueButton before 2.2.8 (or earlier) does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
CVE-2020-27607
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), the client-side Mute button only signifies that the server should stop accepting audio data from the client. It does not directly configure the client to stop sending audio data to the server, and thus a modified server could store the audio data and/or tr...
CVE-2020-27608
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document.
CVE-2020-27609
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 records a video meeting despite the deactivation of video recording in the user interface. This may result in data storage beyond what is authorized for a specific meeting topic or participant.