The rapid adoption of AI for code generation has been nothing short of astonishing, and it’s completely transforming how software development teams function. According to […]
CVE Uncertainty Underlines Importance of Cyber Resilience
Organizations need to broaden their strategy to manage vulnerabilities more effectively and strengthen network cyber resilience. The original article found on darkreading Read More
Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data
DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95% of Fortune 500 companies, and boasts a user base exceeding one […]
WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack
A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a widely used WordPress extension with over 100,000 active installations. This plugin […]
Government Calls on Organizations to Adopt SIEM and SOAR Solutions
In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications to guide organizations through the implementation and prioritization of Security Information […]
Scan Interference
I believe that scan interference is one of the primary issues that many customers and ASV providers don’t understand. This post is to help everyone understand what it is and how to remediate it during an ASV scan.
To ensure reliable scanning, the ASV scan solution must operate without interference from active protection systems. Here, “active” refers to security systems that adjust their behavior based on data from non-attack network traffic patterns. These systems may include intrusion prevention systems (IPS), web application firewalls (WAF), network security controls, quality of service (QoS) devices, and even spam filters that block traffic based on prior SMTP data.
Non-attack traffic refers to legitimate network patterns that do not indicate malformed or malicious activity. In contrast, attack traffic includes malicious patterns or those matching known attack signatures, malware, or packets that exceed the maximum allowed IP packet size.
If an ASV identifies that an active protection system has blocked or filtered a scan, it must follow the procedures outlined in the Resolving Inconclusive Scans section (7.6) of the ASV Program Guide.
Resolving Inconclusive Scans
There are three methods to address an inconclusive scan:
- Temporary Configuration Changes: The customer may need to adjust settings to facilitate the scan.
- Evidence Provision: The customer can provide proof that the scan was not actively blocked.
- Collaboration: The customer and ASV can agree on a method to conduct scans without interference.
Temporary Configuration Changes
To allow the scan to proceed without hindrance, the customer may need to implement temporary configuration changes. For instance, active protection systems like IPS and WAF should be set to permit the ASV scan to complete.
Detecting all vulnerabilities is essential to the defense-in-depth strategy emphasized in the PCI DSS. If a scan cannot identify vulnerabilities on Internet-facing systems due to blocking by an active protection system, those vulnerabilities may remain unaddressed and could be exploited by attackers whose methods do not trigger the protection mechanisms.
Conducting scans during planned maintenance windows enables customers to prepare for scans, implement temporary changes to minimize interference with ASV traffic, and monitor their systems as needed.
These suggested changes are temporary and only necessary for the duration of the ASV scan and for the relevant external-facing IP addresses.
If you would like to know more about the ASV program, you can read my other blog post here.
Note: Temporary configuration changes do not require the scan customer to “whitelist” or grant the ASV a higher level of network access.
The post Scan Interference appeared first on .
APT36 and Sidecopy Hackers Target India’s Critical Infrastructure with Malware Attacks
Seqrite Labs, India’s largest malware analysis facility, has uncovered a sophisticated campaign dubbed Operation Sindoor, orchestrated by Pakistan-aligned threat groups APT36 and Sidecopy. Launched on […]
Hackers Exploit Craft CMS Vulnerability to Inject Cryptocurrency Miner Malware
Threat actors have exploited a critical Remote Code Execution (RCE) vulnerability, identified as CVE-2025-32432, in the Craft Content Management System (CMS). Discovered by Orange Cyberdefense […]
Quantencomputer knacken RSA-Verschlüsselungen noch schneller
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?quality=50&strip=all 3349w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2307333723.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: […]
Hackers Use Fake OneNote Login to Capture Office365 and Outlook Credentials
A recent investigation by security analysts has uncovered a persistent phishing campaign targeting Italian and U.S. users, utilizing a chain of free cloud platforms and […]