Thursday , April 24 2025

infosecbulletin

Who apply for the license of Digital Bank in Bangladesh?

Bangladesh Bank has taken the initiative to establish Digital Bank with the aim of providing global information technology-based digital banking services to the people for the purpose of building a ‘Smart Bangladesh’ declared by the Government of Bangladesh. In this context, Bangladesh Bank has approved the ‘Guidelines for setting up …

Read More »

Fortinet Patches Critical RCE Vulnerability in FortiNAC

Fortinet has released patches to address a critical vulnerability in its FortiNAC network access control solution. The vulnerability, tracked as CVE-2023-33299, is a deserialization of untrusted data issue that could allow an unauthenticated attacker to execute unauthorized code or commands on affected devices. The vulnerability impacts FortiNAC versions up to …

Read More »

Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam

Joseph James O’Connor, a 24-year-old British citizen, was sentenced to five years in prison in the United States for his role in the July 2020 Twitter hack. O’Connor, who went by the online alias “PlugwalkJoe,” pleaded guilty to criminal schemes that included unauthorized access to Twitter’s backend tools, SIM swapping …

Read More »

CISA orders to patch iPhone bugs abused in spyware attacks

Today, CISA ordered federal agencies to patch recently patched security vulnerabilities exploited as zero-days to deploy Triangulation spyware on iPhones via iMessage zero-click exploits. The warning comes after Kaspersky published a report detailing a Triangulation malware component used in a campaign it tracks as “Operation Triangulation.” Kaspersky says it found …

Read More »

Critical vulnerability in Fortinet FortiNAC, allow attackers taking control of systems

Cybersecurity solutions company Fortinet has updated its zero-trust access solution FortiNAC to address a critical-severity vulnerability that attackers could leverage to execute code and commands. FortiNAC is a allows organizations to manage network-wide access policies, gain visibility of devices and users, and secure the network against unauthorized access and threats. …

Read More »