Our mission

The world is more connected today than it has ever been. Technology is wound deep into our lives and has become part of our routine. With great advances we have also seen a greater... More Details

Report a security vulnerability

If you believe you have discovered a security or privacy vulnerability that affects Karen IT devices, software, services, or Karen IT-owned web servers, please report it to us.Fill... More Details

Blocked Network Delist

If your IP/s or ASN is blocked in the Karen IT network،follow these steps to submit a delisting request. AS are responsible for making sure that from their network isn't abusive o... More Details

Karen IT Security Key

Due to the sensitive nature of security information, Karen IT provides a method for you to: Verify the authenticity of security notifications Encrypt messages to send to Kare... More Details

Block Checker Hub

  Block Checker Hub Welcome to the Network Filtering/Blocked Check Hub. Here, you can access various tools to verify if specific domains or IP addre... More Details

REPORT A CYBER ISSUE

  Report to KSRC Karen IT provides secure means for constituents and partners to report incidents, phishing attempts, malware, and vulnerabilities. To submit a rep... More Details

Incident Reporting System

The KSRC Incident Reporting System provides a secure web-enabled means of reporting computer security incidents to KSRC. This system assists analysts in providing timely handling o... More Details

Network Blocking Policy

Karen IT operates a large-scale network and implements strict policies regarding the blocking of IP addresses, CIDR ranges, and Autonomous Systems (AS) to maintain the integrity ... More Details

1 - 11 of ( 11 ) records