Spamhaus Blocklist listings are moving

Any abuse desk worker or Trust and Safety team member who has received a Spamhaus Blocklist email notification, can view the full details of the listing on www.
If you're not familiar, the SBL is a list of IP addresses that Spamhaus Project researchers have identified as malicious.
By malicious, we mean they're being observed as doing something untoward, e.g. sending spam, or snowshoe spamming, behaving like a bulletproof hosting company or hijacking IP space; in other words, they're the sort of IP addresses you don't want to accept email from.
When one of our researchers makes an SBL listing for an IP or range of IP addresses, they send the network or hosting company responsible for that IP an email notification.
Within this notification is a link to all the information relating to why the IP, or range, has been listed on the SBL. Until now, the SBL listings have resided on the Spamhaus Project website.
For a number of reasons this is about to change.
We have taken away all the current listing information from our main site www.
Spamhaus.org and moved them to a separate dedicated site.
While it may be familiar to many, and perhaps comfortingly so, it is in need of a revamp.
It makes sense to relocate the SBL listings to this tool.
This way, all IP and domain reputation information can be found in one place.
If your IP address also has listings on other datasets, such as the XBL Exploits blocklist, you can view these at the same time.
In exactly the same way you do now - Spamhaus Project researchers will email you an SBL listing notification email.
It will include a URL starting with https://check.
Spamhaus.org/ to view the SBL listing details on the Checker.
You can use the SBL ticket number to search for the listing in the Checker directly.
To go directly to the page, you can use the following URL format: check.
For senders who receive bounced email messages with an associated SBL listing, a URL is included to view more details.
This URL will also navigate to the Checker rather than The Spamhaus Project website.
The relocation of the SBL listings to the Spamhaus IP and Domain Reputation Checker is expected to take place in mid-February 2024.


This Cyber News was published on www.spamhaus.org. Publication date: Thu, 18 Jan 2024 17:13:04 +0000


Cyber News related to Spamhaus Blocklist listings are moving

Spamhaus Blocklist listings are moving - Any abuse desk worker or Trust and Safety team member who has received a Spamhaus Blocklist email notification, can view the full details of the listing on www. If you're not familiar, the SBL is a list of IP addresses that Spamhaus Project ...
5 months ago Spamhaus.org
Tech CEO Sentenced to 5 Years in IP Address Scheme - Amir Golestan, the 40-year-old CEO of the Charleston, S.C. based technology company Micfo LLC, has been sentenced to five years in prison for wire fraud. Golestan's sentencing comes nearly two years after he pleaded guilty to using an elaborate ...
7 months ago Krebsonsecurity.com
CVE-2024-24713 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Auto Listings Auto Listings – Car Listings & Car Dealership Plugin for WordPress allows Stored XSS.This issue affects Auto Listings ...
4 months ago
Imperva Uncovers CVE-2023-22524, A RCE Vulnerability - In my latest exploration into Atlassian Companion, an application for editing Confluence files through desktop applications, I discovered a new remote code execution vulnerability affecting all macOS users. This exploration was sparked by Wojciech ...
6 months ago Imperva.com
Meet Ika & Sal: The Bulletproof Hosting Duo from Hell - In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. The Spamdot admins went by the ...
5 months ago Krebsonsecurity.com
The Biggest Tech Talent Gap Can Be Found in the SAP Ecosystem - They're not just looking for people who can write code; they want individuals who can implement, integrate, and run a variety of software platforms crucial for modern businesses. A recent Forbes case study explored dynamic areas like cybersecurity, ...
6 months ago Cysecurity.news
Hackers Gaining Unauthorized Access to Windows Devices Through Silver and BYOVD Exploits - Last summer, cybercriminals began using Sliver as an alternative to Cobalt Strike, using it for monitoring networks, executing commands, loading reflective DLLs, spawning sessions, and manipulating processes. Recently, attacks have been observed ...
1 year ago Heimdalsecurity.com
CVE-2023-4581 - Excel `.xll` add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm. This vulnerability affects Firefox < 117, Firefox ESR < 102.15, ...
9 months ago
Does moving to the cloud mean compromising on security? - The transition to cloud computing is an evolution that many organisations are still undertaking to improve efficiency, scalability, and flexibility in their operations. Cloud services offer recognised advantages, such as moving IT infrastructure ...
4 months ago Securityboulevard.com
Keeper Security Survey Finds 82% of IT Leaders Want to Move Their On-Premises Privileged Access Management Solution to the Cloud - PRESS RELEASE. CHICAGO, Dec. 5, 2023 - Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, today released findings from its ...
7 months ago Darkreading.com
US sanctions Russian for cleaning Ryuk's and oligarchs' cash The Register - A Russian woman the US accuses of being a career money launderer is the latest to be sanctioned by the country for her alleged role in moving hundreds of millions of dollars on behalf of oligarchs and ransomware criminals. Among these was her alleged ...
7 months ago Theregister.com
Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far - Today's attackers rarely conduct lateral movement manually. For attackers, lateral movement is an exercise in taking what they are given: They are not moving throughout the network according to some sort of preplanned map, but following open pathways ...
6 months ago Securityboulevard.com
3 benefits of going cloud native - Since the start of Microsoft Intune in 2010, we have been working on and iterating toward simplified Windows management, in part by moving infrastructure from on-premises to the cloud. As the capabilities of our customers and Intune grew, a pure ...
7 months ago Microsoft.com
As Digital Payments Explode in Popularity, Cybercriminals are Taking Notice - With $54 trillion in payments flowing through the world's leading transaction avenues, the payments space is truly exploding. Traditional banks are moving full speed ahead in fulfilling consumer expectations for instant and easy digital payments by ...
6 months ago Cyberdefensemagazine.com
7 Keys to an Effective Hybrid Cloud Migration Strategy - Not very long ago, a hybrid cloud migration strategy amounted to a business extending its internal workloads into an environment it doesn't own. A hybrid cloud strategy was relatively simple - a combination of on-site resources and some type of cloud ...
6 months ago Techtarget.com
Why Companies Are Moving Back to On-Premise From the Cloud - The past few years have made cloud computing an undisputed king of IT infrastructure in business. Companies flocked to the cloud for cost-efficiency, scalability, and flexibility. The online survey portals show that the cloud adoption rate among ...
5 months ago Feeds.dzone.com
CVE-2024-27286 - Zulip is an open-source team collaboration. When a user moves a Zulip message, they have the option to move all messages in the topic, move only subsequent messages as well, or move just a single message. If the user chose to just move one message, ...
3 months ago Tenable.com
International Operation Takes Down 593 Malicious Cobalt Strike Servers - Law enforcement agencies from around the world have successfully shut down 593 rogue servers running unauthorized versions of Cobalt Strike, a tool often misused by cybercriminals. Cobalt Strike, developed in 2012 by Raphael Mudge and now owned by ...
4 days ago Cybersecuritynews.com
CVE-2023-51545 - Cross-Site Request Forgery (CSRF), Deserialization of Untrusted Data vulnerability in ThemeHigh Job Manager & Career – Manage job board listings, and recruitments.This issue affects Job Manager & Career – Manage job board listings, and ...
6 months ago
CVE-2024-21747 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting.This issue affects WP ERP | Complete HR solution ...
5 months ago Tenable.com
CVE-2024-32799 - Missing Authorization vulnerability in Merv Barrett Easy Property Listings.This issue affects Easy Property Listings: from n/a through 3.5.3. ...
4 weeks ago
More Than One Third Of Facebook Marketplace Ads Could Be Scams - Facebook Marketplace scams are a sadly commonplace occurrence on the platform, and recent reports indicate the problem may be getting even worse. A recent study of Facebook Marketplace sellers conducted by TSB retail banking company, a UK financial ...
5 months ago Facecrooks.com
CVE-2021-39968 - Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class. ...
2 years ago
CVE-2021-32793 - Pi-hole's Web interface provides a central location to manage a Pi-hole instance and review performance statistics. Prior to Pi-hole Web interface version 5.5.1, the function to add domains to blocklists or allowlists is vulnerable to a stored ...
2 years ago
CVE-2007-4100 - MLDonkey before 2.9.0 does not load certain code from $MLDONKEY/web_infos/ before the network modules become active, which allows remote attackers to bypass the IP blocklist. ...
6 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)