Information Security is staying as current as possible with what is happening in the world around you. Threats evolve, hackers and cyber-criminals change their tactics often and attacks happen every second of the day. I came across a service that provides a unique, real-time view into the state of the Internet attacks and where they are coming from.
Norse has deployed a very unique threat intelligence network around the Internet to monitor and report on the active attacks happening. This provides companies visibility to aid their efforts to protect their own environments and systems.
Norse provides extensive products and services but they also provide a higher level map that anyone can access to get a small insight to what is really going on. You can access the Norse map here.
From the Norse website on how they do it –
Norse maintains the world’s largest dedicated threat intelligence network. With over eight million sensors that emulate over six thousand applications – from Apple laptops, to ATM machines, to critical infrastructure systems, to closed-circuit TV cameras – the Norse Intelligence Network gathers data on who the attackers are and what they’re after. Norse delivers that data through the Norse Appliance, which pre-emptively blocks attacks and improves your overall security ROI, and the Norse Intelligence Service, which provides professional continuous threat monitoring for large networks.
Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see which countries are aggressors or targets at the moment, using which type of attacks (services-ports).
This tool opens the eyes to even the most experienced security professionals that we are at war, a war that never stops. I recommend accessing this map in the middle of the night Unites States time and see what’s going on when China is in their daytime. Impressive and scary the amount of activity and targets hit.
Add this to your tool box of resources to use in your journey of protection. It never ends.
End of line.
Binary Blogger has spent 20 years in the Information Security space currently providing security solutions and evangelism to clients. From early web application programming, system administration, senior management to enterprise consulting I provide practical security analysis and solutions to help companies and individuals figure out HOW to be secure every day.