CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-4oauPSZA4nmjWaY74RhV-A' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:46:05 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 17:11:17 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210098-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759770676.862875,VS0,VE1150
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8562
RH-ISIRT
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
RH-ISIRT
Team Information | |
---|---|
Team name | RH-ISIRT |
Official team name | Red Hat Information Security Incident Response Team |
Member since | March 1, 2012 |
Host organization | Red Hat |
Country of team | United States of America (the) US |
Other countries of team | Australia, Czechia AU CZ |
Date of establishment | 2009-01-01 |
Business Hours | |
---|---|
Description of business hours | 24x5 (Sunday 22:00 UTC – Friday 21:00 UTC) |
Constituency | |
---|---|
Source of Constituency | Internal to host |
Description of Constituency | Internal |
Internet Domain Address | redhat.com, 209.132.176.0/20, 66.187.224.0/20 |
Cryptography | |
---|---|
PGP key id | 0x50EB9D550CFE2855 |
PGP fingerprint | A92DF9F915995C7419045F6C50EB9D550CFE2855 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=vVc9
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.