Submarine cable damage in the Red Sea is causing problems for telecommunications networks. Providers need to reroute a significant amount of traffic between Asia, Europe, and the Middle East, which includes internet traffic. Cables belonging to four major telecoms networks have been “cut” causing “significant” disruption to communications networks in …
Read More »Bangladesh to give importance on native cyber security startups; State minister Palak
State Minister for Posts, Telecommunications and Information Technology Zunayed Ahmed Palak give importance on domestic cyber security startups to reduce dependencies on foreign company . He said this at the Bangladesh Cyber Security Summit organized by Bangladesh Brand Forum. Palak said that country’s cyber security cannot be guaranteed from foreign …
Read More »Canadian police need warrant to obtain IP address
The Canadian Supreme Court ruled that police must have a warrant before asking for the internet protocol address of Canadians. The Supreme Court ruled 5-4 that Canadians have privacy rights protected by the Charter when police ask for information about their online activities. “Personal privacy is vital to individual dignity, …
Read More »
Avast report
Hackers Exploited Windows Kernel Flaw as Zero-Day in attack
Microsoft updated a security flaw in its AppLocker software, but the North Korean Lazarus Group was able to use it for a cyberattack before the update. Avast researchers found the flaw in Microsoft software under the CVE-2024-21338. This flaw allowed Lazarus to use an updated version of its own malware …
Read More »CISA Releases Two Industrial Control Systems Advisories
CISA released two advisories on February 29, 2024. The advisories warn about security issues, vulnerabilities, and exploits related to Industrial Control Systems (ICS). ICSA-24-060-01 Delta Electronics CNCSoft-B ICSMA-24-060-01 MicroDicom DICOM Viewer EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: CNCSoft-B Vulnerability: Stack-based Buffer Overflow RISK …
Read More »
Semianr at Dhaka
“Forescout” to focus on Bangladeshi market
Cyber security leader Forescout collaborating with Smart Data arranged a seminar on Thursday (29 February) where CISO, CTO, COO and IT professionals from the industry joined in a hotel at Dhaka. Forescout Technologies, Inc. is a global leader in cybersecurity. It identifies, protect, and ensure compliance of all cyber assets, …
Read More »CISA Releases Resource Guide for University Cybersecurity Clinics
CISA released a Resource Guide for Cybersecurity Clinics today. This guide explains how CISA can collaborate and assist cybersecurity clinics and their clients. University cybersecurity clinics train students to strengthen the digital defenses of under-resourced organizations. They help address the national cyber workforce gap by developing a talent pipeline for …
Read More »NIST Releases Cybersecurity Framework 2.0 Officially
NIST has released its Cybersecurity Framework 2.0 after several years of consideration. The new framework expands its recommendations to cover the concerns of organizations beyond critical infrastructure. NIST issued the first CSF in 2014, in response to a presidential executive order, to assist organizations, particularly critical infrastructure, in managing cybersecurity …
Read More »CISA Issues Alert on APT29’s Cloud Infiltration Tactics
CISA and the UK’s NCSC released a joint advisory about new tactics of Russian Foreign Intelligence Service (SVR) cyber actors. This group, also known as APT29, Midnight Blizzard, the Dukes or Cozy Bear, has been identified by the US as a cyber-espionage entity linked to the Russian SVR intelligence agency. …
Read More »Bangladesh to form ‘Cyber Police Unit’: PM Sheikh Hasina
The Prime Minister of Bangladesh Sheikh Hasina has announced to form ‘Cyber Police Unit’, a separate unit to combat cyber crime. He said this while speaking to the chief guest at the Police Week inauguration ceremony at Rajarbagh Police Lines on Tuesday, February 27. The Prime Minister announced the establishment …
Read More »