logo
Issa Khoury announces start of receiving bids for Industry Ministry's automation

Issa Khoury announces start of receiving bids for Industry Ministry's automation

National News03-05-2025

NNA - Minister of Industry Joe Issa Khoury announced on Saturday the start of receiving tenders for the automation of the Ministry of Industry, with the assistance of the United Nations Development Programme (UNDP).
He emphasized that this is the first step towards eliminating corruption, facilitating industrial sector transactions, improving administrative productivity, and digitizing files.
Below is the link for submitting applications: https://procurement-notices.undp.org/view_negotiation.cfm?nego_id=33021
==========R.Sh.

Hashtags

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Smuggling and tax evasion at Lebanese ports: Can AI and technology stem the losses?
Smuggling and tax evasion at Lebanese ports: Can AI and technology stem the losses?

LBCI

time11 hours ago

  • LBCI

Smuggling and tax evasion at Lebanese ports: Can AI and technology stem the losses?

Report by Lara El Hachem, English adaptation by Yasmine Jaroudi Smuggling and customs tax evasion have long plagued Lebanon's ports, draining the state's coffers by hundreds of millions of dollars over the years. One of the primary tactics employed by smugglers involves falsifying container manifests to conceal valuable goods beneath low-taxed or duty-free items. For example, a container officially declared as carrying baby formula, taxed accordingly, arrives in Beirut. Hidden alongside the formula are other goods of much higher value, evading proper customs fees. This layered deception involves a complex network where criminal mafias intersect with political and security interests. The introduction of AI-powered scanners capable of detecting suspicious shipments based on coordinates promises to reduce smuggling. However, experts caution that while technology may help curb smuggling, it cannot entirely eliminate customs tax evasion, which often involves manipulating invoice values to evade taxes. In one common scheme, a container declared as carrying laptops under a low-duty category might actually contain higher-value models, resulting in the payment of lower customs fees. This type of fraud can only be detected through manual inspection by experienced customs officers, who can identify discrepancies between the actual goods and the declared manifest. Historically, only about 6% of containers underwent scanning, with even fewer subject to thorough manual inspection. With the reduction of physical inspections, concerns arise about who will conduct detailed audits to catch these evasions. Experts agree it is nearly impossible to completely shut the doors on smuggling and tax evasion, especially given the difficulty of controlling collusion among port workers and officials. Nonetheless, efforts are underway to minimize these losses. The Lebanese Armed Forces support customs officials by conducting secondary inspections when suspicions arise. Meanwhile, customs authorities stress the urgent need to activate dedicated auditing and investigation units focused on verifying shipment values and uncovering fraudulent activities.

16 billion passwords exposed in record-breaking data breach
16 billion passwords exposed in record-breaking data breach

Ya Libnan

time12 hours ago

  • Ya Libnan

16 billion passwords exposed in record-breaking data breach

Several collections of login credentials reveal one of the largest data breaches in history, totaling a humongous 16 billion exposed login credentials. The data most likely originates from various infostealers. This story, based on unique Cybernews findings and originally published on the website on June 18, is constantly being updated with clarifications and additional information in response to public discourse. The most recent version of the article features comments from Cybernews researcher Aras Nazarovas and Bob Diachenko who unveiled this recent data leak. We've also added a few screenshots as proof of the leak. Key takeaways: Unnecessarily compiling sensitive information can be as damaging as actively trying to steal it. For example, the Cybernews research team discovered a plethora of supermassive datasets, housing billions upon billions of login credentials. From social media and corporate platforms to VPNs and developer portals, no stone was left unturned. Our team has been closely monitoring the web since the beginning of the year. So far, they've discovered 30 exposed datasets containing from tens of millions to over 3.5 billion records each. In total, the researchers uncovered an unimaginable 16 billion records. None of the exposed datasets were reported previously, bar one: in late May, Wired magazine reported a security researcher discovering a 'mysterious database' with 184 million records. It barely scratches the top 20 of what the team discovered. Most worryingly, researchers claim new massive datasets emerge every few weeks, signaling how prevalent infostealer malware truly is. 'This is not just a leak – it's a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What's especially concerning is the structure and recency of these datasets – these aren't just old breaches being recycled. This is fresh, weaponizable intelligence at scale,' researchers said. The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. Most of the datasets were temporarily accessible through unsecured Elasticsearch or object storage instances. Researchers claim that most of the data in the leaked datasets is a mix of details from stealer malware, credential stuffing sets, and repackaged leaks. There was no way to effectively compare the data between different datasets, but it's safe to say overlapping records are definitely present. In other words, it's impossible to tell how many people or accounts were actually exposed. However, the information that the team managed to gather revealed that most of the information followed a clear structure: URL, followed by login details and a password. Most modern infostealers – malicious software stealing sensitive information – collect data in exactly this way. Information in the leaked datasets opens the doors to pretty much any online service imaginable, from Apple, Facebook, and Google, to GitHub, Telegram, and various government services. It's hard to miss something when 16 billion records are on the table. According to the researchers, credential leaks at this scale are fuel for phishing campaigns, account takeovers, ransomware intrusions, and business email compromise (BEC) attacks. 'The inclusion of both old and recent infostealer logs – often with tokens, cookies, and metadata – makes this data particularly dangerous for organizations lacking multi-factor authentication or credential hygiene practices,' the team said. The datasets that the team uncovered differ widely. For example, the smallest, named after malicious software, had over 16 million records. Meanwhile, the largest one, most likely related to the Portuguese-speaking population, had over 3.5 billion records. On average, one dataset with exposed credentials had 550 million records. Some of the datasets were named generically, such as 'logins,' 'credentials,' and similar terms, preventing the team from getting a better understanding of what's inside. Others, however, hinted at the services they're related to. For example, one dataset with over 455 million records was named to indicate its origins in the Russian Federation. Another dataset, with over 60 million records, was named after Telegram, a cloud-based instant messaging platform. 'The inclusion of both old and recent infostealer logs – often with tokens, cookies, and metadata – makes this data particularly dangerous for organizations lacking multi-factor authentication or credential hygiene practices,' the team said. While naming is not the best way to deduce where the data comes from, it seems some of the information relates to cloud services, business-oriented data, and even locked files. Some dataset names likely point to a form of malware that was used to collect the data. It is unclear who owns the leaked data. While it could be security researchers that compile data to check and monitor data leaks, it's virtually guaranteed that some of the leaked datasets were owned by cybercriminals. Cybercriminals love massive datasets as aggregated collections allow them to scale up various types of attacks, such as identity theft, phishing schemes, and unauthorized access. A success rate of less than a percent can open doors to millions of individuals, who can be tricked into revealing more sensitive details, such as financial accounts. Worryingly, since it's unclear who owns the exposed datasets, there's little impact users can do to protect themselves. However, basic cyber hygiene is essential. Using a password manager to generate strong, unique passwords, and updating them regularly, can be the difference between a safe account and stolen details. Users should also review their systems for infostealers, to avoid losing their data to attackers. With a dataset containing 16 billion passwords, that's equivalent to two leaked accounts for every person on the planet. We don't really know how many duplicate records there are, as the leak comes from multiple datasets. However, some reporting by other media outlets can be quite misleading. Some claim that Facebook, Google, and Apple credentials were leaked. While we can't completely dismiss such claims, we feel this is somewhat inaccurate. Bob Diachenko, a Cybernews contributor, cybersecurity researcher, and owner of is behind this recent major discovery. CYBERNEWS

US sanctions target those providing Iran with 'defense machinery,' Houthi oil trading
US sanctions target those providing Iran with 'defense machinery,' Houthi oil trading

LBCI

time13 hours ago

  • LBCI

US sanctions target those providing Iran with 'defense machinery,' Houthi oil trading

The Trump administration said on Friday it had issued fresh Iran-related sanctions targeting eight entities, one vessel and one person for their alleged role in providing sensitive machinery for Tehran's defense industry. "The United States remains resolved to disrupt any effort by Iran to procure the sensitive, dual-use technology, components, and machinery that underpin the regime's ballistic missile, unmanned aerial vehicle, and asymmetric weapons programs," U.S. Treasury Secretary Scott Bessent said. "Treasury will continue to degrade Iran's ability to produce and proliferate these deadly weapons, which threaten regional stability and global security," he added in a statement announcing the action. Two of the entities include shipping companies based in Hong Kong: Unico Shipping Co Ltd and Athena Shipping Co Ltd, the statement said. The Treasury Department on Friday also issued counterterrorism-related sanctions targeting Yemen's Houthis over alleged illicit oil trading and shipping, it said in a separate statement. Those sanctions target four individuals, 12 entities, and two vessels over imported oil and other illicit goods to support the Houthis, the department said. Reuters

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store