CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-ss5_UqXA75A1eh28Oze4zA' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:45:57 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 22:45:57 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210038-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759790756.209220,VS0,VE1174
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8943
NBCU Cyber Defense
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
NBCU Cyber Defense
Team Information | |
---|---|
Team name | NBCU Cyber Defense |
Official team name | NBCU Cyber Defense |
Member since | May 29, 2014 |
Host organization | NBCUniversal |
Country of team | United States of America (the) US |
Other countries of team | United Kingdom of Great Britain and Northern Ireland (the) GB |
Date of establishment | 2005-01-05 |
Business Hours | |
---|---|
Description of business hours | NBCU ISRT runs operations on two coasts and has hours of normal operations from 7 AM EST to 9 PM EST. |
Constituency | |
---|---|
Type of Constituency | Other commercial |
Source of Constituency | Both external and internal |
Description of Constituency | NBCU ISRT constituency is made up of employees and customers of NBCUniversal's services and domains including film, broadcast media, and online properties. |
Internet Domain Address | nbcuni.com and 100 additional domains. |
Country of Constituency | United States of America (the) US |
Cryptography | |
---|---|
PGP key id | 0xC916A5DEBADDB2FD |
PGP fingerprint | C3CCE2FB86EF7290B4F05E21C916A5DEBADDB2FD |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=pwW8
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.