HtmlToText
skip to main content official website of the department of homeland security search query main menu home about us careers publications alerts and tips related resources c³ vp the national cybersecurity and communications integration center (nccic) is the nation’s flagship cyber defense, incident response, and operational integration center. our mission is to reduce the nation’s risk of systemic cybersecurity and communications challenges. security alerts, tips, and other updates enter email address contact us (888) 282-0870 send us email download pgp/gpg keys incidents, indicators, phishing, malware, or vulnerabilities tlp:white tlp:white current activity view current activity feed nccic webinar series on russian government cyber activity published thursday, july 19, 2018 nccic will conduct a series of webinars on russian government cyber activity against critical infrastructure (as detailed in nccic alert ta18-074a ), which will feature nccic subject matter experts discussing recent cybersecurity incidents, mitigation techniques, and resources that are available to help protect critical assets. the same webinar will be held from 1-2:30 p.m. et on the dates listed below: read full entry » cisco releases security updates published wednesday, july 18, 2018 cisco has released updates to address vulnerabilities affecting cisco products. a remote attacker could exploit one of these vulnerabilities to take control of an affected system. nccic encourages users and administrators to review the cisco security advisories and alerts website and apply the necessary updates. read full entry » oracle releases july 2018 security bulletin published tuesday, july 17, 2018 oracle has released its critical patch update for july 2018 to address 334 vulnerabilities across multiple products. a remote attacker could exploit some of these vulnerabilities to take control of an affected system. nccic encourages users and administrators to review the oracle july 2018 critical patch update and apply the necessary updates. read full entry » more updates announcements nccic webinar series on russian government cyber activity nccic will conduct a series of webinars on russian government cyber activity against critical infrastructure (as detailed in nccic alert ta18-074a ), which will feature nccic subject matter experts discussing recent cybersecurity incidents, mitigation techniques, and resources that are available to help protect critical assets. the same webinar will be held from 1-2:30 p.m. et on the dates listed below: hidden cobra - north korean malicious cyber activity on june 14, 2018, the department of homeland security (dhs) and the federal bureau of investigation (fbi) identified trojan malware variants—referred to as typeframe—used by the north korean government. the u.s. government refers to the malicious cyber activity by the north korean government as hidden cobra.for more information, visit https://www.us-cert.gov/hiddencobra . hidden cobra - north korean malicious cyber activity on may 29, 2018, the department of homeland security (dhs) and the federal bureau of investigation (fbi) identified two families of malware—referred to as joanap and brambul—used by the north korean government. the u.s. government refers to the malicious cyber activity by the north korean government as hidden cobra. for more information, visit https://www.us-cert.gov/hiddencobra . more announcements » recent vulnerabilities vu#304725: bluetooth implementations may not sufficiently validate elliptic curve parameters during diffie-hellman key exchange monday, july 23, 2018 at 10:29 am vu#338343: strongswan vpn charon server vulnerable to buffer underflow wednesday, may 23, 2018 at 11:25 am vu#180049: cpu hardware utilizing speculative execution may be vulnerable to cache side-channel attacks monday, may 21, 2018 at 6:19 pm vu#122919: openpgp and s/mime mail client vulnerabilities monday, may 14, 2018 at 4:20 pm vu#631579: hardware debug exception documentation may result in unexpected behavior tuesday, may 8, 2018 at 1:09 pm vu#283803: integrated gpus may allow side-channel and rowhammer attacks using webgl ("glitch") thursday, may 3, 2018 at 9:11 am vu#974272: microsoft outlook retrieves remote ole content without prompting tuesday, april 10, 2018 at 1:20 pm other resources: national vulnerability database more vulnerability notes » national cyber awareness system alerts timely information about current security issues, vulnerabilities, and exploits. jul 20 emotet malware may 29 hidden cobra – joanap backdoor trojan and brambul server message block worm may 25 cyber actors target home and office routers and networked devices worldwide more alerts bulletins weekly summaries of new vulnerabilities along with patch information when available. jul 23 vulnerability summary for the week of july 16, 2018 jul 16 vulnerability summary for the week of july 9, 2018 jul 09 vulnerability summary for the week of july 2, 2018 more bulletins tips advice and best practices about common security issues for the general public. jun 26 defending against illicit cryptocurrency mining activity jun 21 securing network infrastructure devices nov 16 securing the internet of things more tips analysis reports provide in-depth analysis on a new or evolving cyber threat. jun 14 mar-10135536-12 – north korean trojan: typeframe may 29 mar-10135536-3 - hidden cobra rat/worm more analysis reports i want to report incidents share indicators report phishing report malware report software vulnerabilities subscribe to alerts receive security alerts, tips, and other updates. enter email address mailing lists and feeds facebook -- twitter contact us (888) 282-0870 send us email download pgp/gpg keys home faq contact us traffic light protocol pcii dhs privacy policy disclaimer accessibility get a pdf reader us-cert is part of the department of homeland security . back to top
Informations Whois
Whois est un protocole qui permet d'accéder aux informations d'enregistrement.Vous pouvez atteindre quand le site Web a été enregistré, quand il va expirer, quelles sont les coordonnées du site avec les informations suivantes. En un mot, il comprend ces informations;
% DOTGOV WHOIS Server ready
Domain Name: US-CERT.GOV
Status: ACTIVE
>>> Last update of whois database: 2017-08-28T05:26:24Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.
SERVERS
SERVER gov.whois-servers.net
ARGS us-cert.gov
PORT 43
TYPE domain
RegrInfo
DOMAIN
NAME us-cert.gov
NSERVER
STARK.BRASS.US-CERT.GOV 208.73.184.110
GREYJOY.BRASS.US-CERT.GOV 208.73.191.39
REGISTERED yes
Go to top