Friday , October 18 2024

infosecbulletin

Investigation committee formed
Justin Trudeau’s birth place Pabna, Bangladesh; Birth certificate issued

Justin Trudeau, Prime Minister of Canada

Justin Trudeau is the current Prime Minister of Canada but according to a recently issued birth certificate his birth place is in Pabna. Surprising but true ‍such an birth certificate has been issued by Ahmedpur Union Parishad in Pabna. As shown in the birth certificate, name is Justin Trudeau, father- …

Read More »

PentesterVibe: A Bangladeshi Platform to hone Pentest Skills

PentesterVive

The journey to mastering penetration testing can be challenging for those interested in security. Besides theoretical knowledge, practical experience is essential to improve your skills and become a skilled pentester. PentesterVibe is a subscription-based service that helps bridge this gap by providing the necessary knowledge and resources to excel in …

Read More »

A project taken
By June 2026, Dhaka to see eco-friendly electric buses, Cars

Electric car

A project has been taken to introduce eco-friendly electric transport in Dhaka. The Road Transport and Highways Department, Bangladesh Road Transport Authority, Department of Environment, and Bangladesh Road Transport Corporation will set up an experimental charging station in Dhaka city. The project will be implemented from now until June 2026. …

Read More »

Hacker exploiting ScreenConnect, F5 bugs : Mandiant

hacker

Hacker allegedly exploiting two popular vulnerabilities to attack U.S. defense contractors, U.K. government entities and institutions in Asia, according to new report by Google owned security firm Mandiant. The report focused on UNC5174, a threat actor. According to Mandiant, UNC5174 used to be a member of Chinese hacktivist groups. However, …

Read More »

CISA, FBI, and MS-ISAC Release Joint Guidance on DDoS

cisa

CISA, FBI, and MS-ISAC updated a guide to help organizations defend against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques: Volumetric, attacks aiming to consume available bandwidth. Protocol, attacks which exploit vulnerabilities in network protocols. Application, attacks targeting vulnerabilities in specific applications or …

Read More »

Exploit released for Fortinet RCE bug used in attacks, patch now it

fortinet

Security researchers created a demonstration of a critical flaw in Fortinet’s FortiClient Enterprise Management Server (EMS) software. The security flaw CVE-2023-48788 is an SQL injection in the DB2 Administration Server (DAS) discovered and reported by the UK’s National Cyber Security Centre (NCSC). It impacts FortiClient EMS versions 7.0 (7.0.1-7.0.10) and …

Read More »

CISA, NSI, FBI released critical infrastructure defense tips against Volt Typhoon

logo

CISA, NSA, FBI, and other US and international partners released a joint fact sheet called “People’s Republic of China State-Sponsored Cyber Activity: Actions for Critical Infrastructure Leaders.” This publication includes contributions from various partners. U.S. Department of Energy (DOE) U.S. Environmental Protection Agency (EPA) U.S. Transportation Security Administration (TSA) U.S. …

Read More »

Trend Micro report
Earth Krahang hackers breach 70 orgs in 23 countries

hacker

The APT group ‘Earth Krahang’ has hacked 70 organizations and attacked at least 116 in 45 countries. Trend Micro researchers have been monitoring a campaign targeting government organizations since early 2022. The group targeted 116 organizations in 35 countries and confirmed at least 70 compromises, including organizations linked to world …

Read More »

IBM X-Force report
APT28 Hacker Group Targeting Asia in Widespread Phishing Scheme

Networking

As of March 2024, X-Force is tracking the APT28 group is carrying out phishing campaigns using fake government and non-governmental organization documents to target different regions around the world, including Central Asia, Europe, the South Caucasus, and North and South America. The discovered lures include a mix of public and …

Read More »