A federal grand jury indicted Linwei Ding, aka Leon Ding, charging him with four counts of theft of trade secrets in connection with an alleged plan to steal from Google LLC (Google) proprietary information related to artificial intelligence (AI) technology. The announcement was made by Attorney General Merrick B. Garland …
Read More »Facebook down due to technical error: loss $100 million roughly
Due to a technical glitch, users worldwide had problems using Facebook and Instagram yesterday. Meta spokesman Andy Stone said the issue was caused by an unspecified “technical issue” which was quickly resolved. The social media has apologized to users for the inconvenience. According to the Daily Mail report, Zuckerberg’s meta …
Read More »Red Sea cables have been damaged, disrupting internet traffic
Submarine cable damage in the Red Sea is causing problems for telecommunications networks. Providers need to reroute a significant amount of traffic between Asia, Europe, and the Middle East, which includes internet traffic. Cables belonging to four major telecoms networks have been “cut” causing “significant” disruption to communications networks in …
Read More »Bangladesh to give importance on native cyber security startups; State minister Palak
State Minister for Posts, Telecommunications and Information Technology Zunayed Ahmed Palak give importance on domestic cyber security startups to reduce dependencies on foreign company . He said this at the Bangladesh Cyber Security Summit organized by Bangladesh Brand Forum. Palak said that country’s cyber security cannot be guaranteed from foreign …
Read More »Canadian police need warrant to obtain IP address
The Canadian Supreme Court ruled that police must have a warrant before asking for the internet protocol address of Canadians. The Supreme Court ruled 5-4 that Canadians have privacy rights protected by the Charter when police ask for information about their online activities. “Personal privacy is vital to individual dignity, …
Read More »
Avast report
Hackers Exploited Windows Kernel Flaw as Zero-Day in attack
Microsoft updated a security flaw in its AppLocker software, but the North Korean Lazarus Group was able to use it for a cyberattack before the update. Avast researchers found the flaw in Microsoft software under the CVE-2024-21338. This flaw allowed Lazarus to use an updated version of its own malware …
Read More »CISA Releases Two Industrial Control Systems Advisories
CISA released two advisories on February 29, 2024. The advisories warn about security issues, vulnerabilities, and exploits related to Industrial Control Systems (ICS). ICSA-24-060-01 Delta Electronics CNCSoft-B ICSMA-24-060-01 MicroDicom DICOM Viewer EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: CNCSoft-B Vulnerability: Stack-based Buffer Overflow RISK …
Read More »
Semianr at Dhaka
“Forescout” to focus on Bangladeshi market
Cyber security leader Forescout collaborating with Smart Data arranged a seminar on Thursday (29 February) where CISO, CTO, COO and IT professionals from the industry joined in a hotel at Dhaka. Forescout Technologies, Inc. is a global leader in cybersecurity. It identifies, protect, and ensure compliance of all cyber assets, …
Read More »CISA Releases Resource Guide for University Cybersecurity Clinics
CISA released a Resource Guide for Cybersecurity Clinics today. This guide explains how CISA can collaborate and assist cybersecurity clinics and their clients. University cybersecurity clinics train students to strengthen the digital defenses of under-resourced organizations. They help address the national cyber workforce gap by developing a talent pipeline for …
Read More »NIST Releases Cybersecurity Framework 2.0 Officially
NIST has released its Cybersecurity Framework 2.0 after several years of consideration. The new framework expands its recommendations to cover the concerns of organizations beyond critical infrastructure. NIST issued the first CSF in 2014, in response to a presidential executive order, to assist organizations, particularly critical infrastructure, in managing cybersecurity …
Read More »