CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-8rQEbkm_zXaJF4mnD_WQ2A' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Tue, 07 Oct 2025 16:46:08 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Wed, 08 Oct 2025 03:32:45 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210072-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759894365.771507,VS0,VE752
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 7982
LMPS CERT
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
LMPS CERT
Team Information | |
---|---|
Team name | LMPS CERT |
Official team name | LMPS Computer Emergency Response Team |
Member since | March 16, 2021 |
Host organization | LMPS |
Country of team | Morocco MA |
Other countries of team | France FR |
Date of establishment | 2007-01-03 |
Website | https://www.lmps-group.com |
Team Contact Information | |
---|---|
Facsimile number | +212522527789 |
Business Hours | |
---|---|
Timezone | GMT+1 |
Description of business hours | 24/7/365 |
How to contact outside business hours | Contact available 24/7/365 (CyberResponse@lmps-group.com) |
Constituency | |
---|---|
Type of Constituency | Other commercial |
Source of Constituency | Both external and internal |
Description of Constituency | LMPS Group provides a complete and diversified range of international cybersecurity services for public and private companies and industries |
Country of Constituency | Algeria, Angola, Benin, Burkina Faso, Burundi, Cabo Verde, Cameroon, Central African Republic (the), Chad, Comoros (the), Congo (the Democratic Republic of the), Congo (the), Côte d'Ivoire, Djibouti, EU, Egypt, Eritrea, Ethiopia, France, French Guiana, French Polynesia, French Southern Territories (the), Gabon, Gambia (the), Ghana, Guinea, Guinea-Bissau, Kenya, Liberia, Libya, Madagascar, Malawi, Mali, Mauritania, Mauritius, Morocco, Mozambique, Namibia, Niger (the), Nigeria, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, South Sudan, Sudan (the), Togo, Zambia, Zimbabwe DZ AO BJ BF BI CV CM CF TD KM CD CG CI DJ EU EG ER ET FR GF PF TF GA GM GH GN GW KE LR LY MG MW ML MR MU MA MZ NA NE NG RW SN SC SL SO SS SD TG ZM ZW |
Cryptography | |
---|---|
PGP key id | 0x7079469B5BA3C401 |
PGP fingerprint | 78A2AF5AF31C40DA05BAD35D7079469B5BA3C401 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: FlowCrypt Email Encryption 7.8.8
Comment: Seamlessly send and receive encrypted email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=rCfV
-----END PGP PUBLIC KEY BLOCK-----
|
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.