Recently published blog posts:
Go to the blog archive and browse all previous blog posts we have published so far.
Subscribe to the GovCERT.ch blog RSS feed to stay up to date and get notified about new blog posts.
Recently published whitepapers:
Trickbot - An analysis of data collected from the botnet
Scripting IDA Debugger to Deobfuscate Nymaim
Fobber Analysis
Subscribe to the whitepapers RSS feed to stay up to date and get notified about new whitepapers.
Report an incident: incidents[at]govcert{dot}chGeneral inquiries: outreach[at]govcert{dot}ch
The following email address can be considered as point of contact for FIRST members and other CERTs/CSIRTs:incidents[at]govcert{dot}ch
GovCERT.ch PGP-Key GovCERT.ch SMIME
Show chart in full screen
These statistics originate from the VulnerableSystemsDB, a database containing systems in Switzerland that can be potentially abused for DDoS amplification and reflection attacks or are otherwise seriously vulnerable on the protocol level. It gives an overview of the most important protocols of the last 30 days and how the number of vulnerable systems evolved in the past 90 days.
MELANI/GovCERT strongly recommends paying attention that no systems can be abused for DDoS reflection/amplification attacks. We regularly inform ISPs about vulnerable systems in their ASNs.
Back to top