loading

Latest Security News updated on: 01-07-2021 18:00

Third Empirical Study On The Cyber Security Of Lebanon - 976 Critical Vulnerabilities

Reading time: 5 min Article

A third empirical study conducted by researchers from the Cybersecurity Empowering Research Team in Q2 2021 revealed 976 low-hanging critical vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 976 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.

Read More
Announcement, Article or Vulnerability
Empirical Study On The Cyber Security Of Lebanon - Uncovering 1645 Critical Vulnerabilities
Reading time: 10 min Paper

In our first paper, we uncover 1645 critical vulnerabilities in the perimeter of Lebanon affecting the majority of its sectors, including critical infrastructure. Given the enormous economic and personal damage imposed by critical vulnerabilities, we use a novel framework to regularly identify these vulnerabilities on a large scale within hours.

Read More
Announcement, Article or Vulnerability
Automating Zmap For UDP Port Scanning
Reading time: 5 min Article

One of the essential steps for hackers or penetration testers before taking over a system or an infrastructure is to get full knowledge about it. This is what so called a reconnaissance phase which can be performed either passively or actively to collect information about the target through various information gathering mechanisms. Port scanning using tools like zmap is an effective active reconnaissance method due to its speed and simplicity to clearly map the intended target. In this writing, we will demonstrate some of the zmap tool capabilities that helps gathering interesting information.

Read More
Announcement, Article or Vulnerability
Cybersecurity Empowering Research Team Launch
Reading time: 3 min Announcement

Early 2019 a group of Lebanese security experts from various sectors had a chance to meet and share their concerns about evolved cyber security threats and their direct impact to homeland country. They volunteered to take a step further in provisioning their collaborative expertise to launch the Empirical CERT team. Our story and mission.

Read More
Announcement, Article or Vulnerability
Automating Email Gathering And Delivery Using OSINT
Reading time: 5 min Article

Impacted parties with critical vulnerabilities should be promptly informed. The Empirical CERT team developed a tool based on OSINT to automate the entire process of email gathering and reporting.

Read More
Announcement, Article or Vulnerability
First Step Towards Unveiling Large Scale Vulnerabilities in Lebanon
Reading time: 5 min Article

With the aim of ensuring a safe online affair in Lebanon, the Lebanese Empirical Cybersecurity Empowering Research Team (CERT) is targeting to check Lebanese IT infrastructure for security and to notify their owners in case any vulnerability was found. To this end, researchers in Empirical CERT developed a cutting-edge workflow to address the security issues of online services in Lebanon. This article will focus on the first step of the workflow, namely, the collection of domain names and emails of Lebanese companies.

Read More
Announcement, Article or Vulnerability
Second Empirical Study On The Cyber Security Of Lebanon - 653 Low Hanging Critical Vulnerabilities
Reading time: 5 min Article

A second empirical study conducted by researchers from Lebanon Cybersecurity Empowering Research Team in Q4 2020 revealed 653 low-hanging critical security vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 653 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.

Read More

Next page