Skip to main content Skip to main menu Skip to footer

Cybersecurity scanning & software resources

Cybersecurity scanning & software resources

Decrease Text Size Increase Text Size

Page Article

Discover if you are vulnerable to cyber-attacks.  Visit the links below to check your computer, your network, websites, IP addresses, and domains for known viruses, spyware, and more. 

Free software

Viruses & Malware Scans

  • Microsoft Safety Scanner - Microsoft Safety Scanner is a scan tool designed to find and remove malware from Windows computers. Simply download it and run a scan to find malware and try to reverse changes made by identified threats.
  • ESET Online Scanner - One-time scan to remove malware and threats from your computer for free.
  • Joe Sandbox URL Analyzer: Examines the URL in real time.
  • Pulsedive: Correlate observed Indicators of Compromise (IOCs) by detecting data breaches, malware infections, or other threat activity.
  • Qualys Browser Check: Qualys BrowserCheck will perform a security analysis of your browsers and plugins.
  • PolySwarm: Scans URLs or files for malicious code and threats.
  • ThreatSTOP Check IoC: Lookup IP addresses and domains against our extensive database of malware-related IOCs.
  • VirusTotal: Analyze suspicious files and URLs to detect types of malware.

Ransomware Decryption Keys List

To help you determine the type of ransomware affecting your device, here are two sites that will to analyze your ransomware and will provide you with the link to download the decryption solution if available.

Network, URL, Website, IP, and Domain Scans

Assess Your Public Asset Risk Profile

A key capability of these tools is identifying exposed assets to enable owners and operators of Industrial Control Systems (ICS), IoT, and IIoT devices to reduce their attack surface by enumerating and detailing any number of Internet-connected targets. By pulling back banners of Internet-connected devices, end users can use any combination of search filters to narrow search results to specific queries for potentially vulnerable devices. 

Shodan ( https://www.shodan.io )

Shodan is a web-based search platform for internet-connected devices.  A key capability of Shodan is its use as an attack surface reduction tool, with the ability to read any number of Internet-connected targets, including ICS and IIoT. By pulling back banners of Internet-connected devices, Shodan can find any combination of search filters to narrow search results to specifically target potentially vulnerable devices. 

Censys ( https://www.censys.io )

Censys is a web-based risk management tool that helps identify publicly accessible assets - even if they can't be scanned by a vulnerability management tool. A key capability of Censys.io is its use as an attack surface reduction tool, with the ability to recognize any number of Internet-connected targets, including ICS and IIoT. With the ability to assess and index IP addresses, parse TLS certificates, and track domains, Censys.io provides a 360-degree depiction of an organization's Internet attack surface. Censys.io has also been positioned as a platform capable of providing visibility into an organization's Internet remote workforce.

Thingful ( https://www.thingful.net )

Thingful is a search engine for the Internet of Things (IoT).  Thingful can also be used in the automatic discovery of IoT data pathways, and thereby support attack surface reduction activities; however, that capability is not its primary purpose. Thingful's main use cases are focused on the manipulation of IoT data in ways that unlock value and visibility within an identified dataset. Specifically, the ability to organize, access, respond and unlock IoT data streams into useful "data pipes" for consumption is key to Thingful's business model.



Page Footer has no content