A deepfake video of actress Tanjin Tisha went viral on social media. The video was shared on multiple Facebook pages and personal profiles, but it was edited with Tisha’s face placed over another woman’s face. The video was edited and shared from the Facebook page “Sushmita”. It was posted on …
Read More »Deep fake video
Anonymous Collective claim
Anonymous Collective claim attack on Bahrain’s E Visa Service
Hacktivist group, Anonymous Collective claim to cyber attack the E Visa service of the Bahrain government. The cyberattack on Bahrain government has raised concerns about the cyber security arena of sensitive data protection. The hacktivist group shared a screen shot of attack of the E Visa services on their social …
Read More »
12th Election
EC Instruct to send voting results of remote areas through WhatsApp
The Election Commission‘s Deputy Secretary Atiyar Rahman has instructed the returning officers to act on the issue. During the 12th National Assembly elections, there might be delays in delivering election materials to the polling stations in the hill districts of Padma, Meghna, and Jamuna, as well as the coastal districts …
Read More »
Land ministry to present
2nd generation naming system “Smart Mutation” coming soon
The Ministry of Lands is going to present the next (2nd) generation naming system Smart Mutation to the citizens of Bangladesh soon. Land Minister Saifuzzaman Chowdhury ordered to develop this system to facilitate mutation application more easily, quickly and safely. A demo of the ‘Smart Mutation’ system was on display …
Read More »
“Leaksmas” Event
Dark Web Expose Massive Volumes Of Leaked PII And Compromised Data
On Christmas Eve, Resecurity protecting Fortune 100 and government agencies worldwide, noticed that multiple actors on the Dark Web were leaking a large amount of data. More than 50 million records containing personal information about consumers from different countries were leaked. The damage caused by this could potentially be worth …
Read More »
Embarking cybersecurity journey
CTF at Khulna Division, registration open
Embark on a cybersecurity journey with Game of Riddles 2024, the first-ever Cyber Security Competition and Conference in Khulna Division Organized by Cyber Security Community Khulna, with technical support and co-organization by VulnSys. Join for a fusion of a cutting-edge Cyber Security Capture The Flag (CTF) Competition and an enlightening …
Read More »Microsoft Disables MSIX App installer protocol abused in attacks
Microsoft disables the ms-appinstaller protocol handler by default due to its misuse by several threat actors to spread malware. “The observed threat actor activity abuses the current implementation of the ms-appinstaller protocol handler as an access vector for malware that may lead to ransomware distribution,” the Microsoft Threat Intelligence team …
Read More »
Big Defence Boost For India
India’s ISRO to launch AI enabled 50 Spy Satellites
India’s space ambitions have grown with the announcement from the Indian Space Research Organisation (ISRO) that they plan to launch 50 satellites in the next five years. These satellites will be important for improving the country’s geo-intelligence capabilities. The satellites will form a network at different levels, allowing for monitoring …
Read More »
SonicWall Discover
Critical Zero-Day in Apache OfBiz ERP System
A new security flaw was found in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. This flaw could be used to get around authentication protections. The vulnerability, CVE-2023-51467, is found in the login feature and is caused by a partial fix for another serious vulnerability (CVE-2023-49070, CVSS score: 9.8) …
Read More »CISA Finalizes Microsoft 365 Secure Configuration Baselines
CISA started the SCuBA project to improve the security of email and cloud environments in the federal government. The project aims to enhance the security features of commonly used products and services and provide better visibility at the enterprise level to support our cybersecurity goals. This meant creating secure configurations …
Read More »