loading

Latest Security News updated on: 17-04-2022 22:00

First Analysis of Cyber Attacks on Lebanon - 2,500,000 attacks within 21 days

Reading time: 3 min Study

Key element within the set of tools in cyber defense is an early warning system as of Honeypots. Honeypots simulate vulnerable systems or services and trap threat actors, which help estimate their behavior to strengthen the deployed defensive strategy. In this study, we deploy honeypot sensors in Beirut to understand the cyber-attacks that roam around the Lebanese perimeter. Here, the main goal is to detect automated attacks where threat actors apply large scans to identify vulnerabilities and exploit these. The analytics showed that more than 2,500,000 attacks had been performed within 21 days.

Read More
Announcement, Article or Vulnerability
Automating Email Gathering And Delivery Using OSINT
Reading time: 5 min Article

Impacted parties with critical vulnerabilities should be promptly informed. The Lebanon CERT team developed a tool based on OSINT to automate the entire process of email gathering and reporting.

Read More
Announcement, Article or Vulnerability
First Step Towards Unveiling Large Scale Vulnerabilities in Lebanon
Reading time: 5 min Article

With the aim of ensuring a safe online affair in Lebanon, the Cybersecurity Empowering Research Team (CERT) is targeting to check Lebanese IT infrastructure for security and to notify their owners in case any vulnerability was found. To this end, researchers in Lebanon CERT developed a cutting-edge workflow to address the security issues of online services in Lebanon. This article will focus on the first step of the workflow, namely, the collection of domain names and emails of Lebanese companies.

Read More
Announcement, Article or Vulnerability
Cybersecurity Empowering Research Team Launch
Reading time: 3 min Announcement

Early 2019 a group of Lebanese security experts from various sectors had a chance to meet and share their concerns about evolved cyber security threats and their direct impact to homeland country. They volunteered to take a step further in provisioning their collaborative expertise to launch the Lebanon CERT team. Our story and mission.

Read More
Announcement, Article or Vulnerability
Attack Surface Analysis Of Lebanon - 761 Critical Vulnerabilities
Reading time: 5 min Study

A fourth empirical study conducted by the Cybersecurity Empowering Research Team in the second semester of 2021 revealed 761 low-hanging critical vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 761 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.

Read More
Announcement, Article or Vulnerability
Empirical Study On The Cyber Security Of Lebanon - Uncovering 1645 Critical Vulnerabilities
Reading time: 10 min Paper

In our first paper, we uncover 1645 critical vulnerabilities in the perimeter of Lebanon affecting the majority of its sectors, including critical infrastructure. Given the enormous economic and personal damage imposed by critical vulnerabilities, we use a novel framework to regularly identify these vulnerabilities on a large scale within hours.

Read More
Announcement, Article or Vulnerability
Third Empirical Study On The Cyber Security Of Lebanon - 976 Critical Vulnerabilities
Reading time: 5 min Study

A third empirical study conducted by researchers from the Cybersecurity Empowering Research Team in Q2 2021 revealed 976 low-hanging critical vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 976 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.

Read More
Announcement, Article or Vulnerability
Second Empirical Study On The Cyber Security Of Lebanon - 653 Low Hanging Critical Vulnerabilities
Reading time: 5 min Study

A second empirical study conducted by researchers from Lebanon Cybersecurity Empowering Research Team in Q4 2020 revealed 653 low-hanging critical security vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 653 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.

Read More
Announcement, Article or Vulnerability
Automating Zmap For UDP Port Scanning
Reading time: 5 min Article

One of the essential steps for hackers or penetration testers before taking over a system or an infrastructure is to get full knowledge about it. This is what so called a reconnaissance phase which can be performed either passively or actively to collect information about the target through various information gathering mechanisms. Port scanning using tools like zmap is an effective active reconnaissance method due to its speed and simplicity to clearly map the intended target. In this writing, we will demonstrate some of the zmap tool capabilities that helps gathering interesting information.

Read More

Next page