Sunday , September 14 2025
BD bank

Bangladesh Bank issues cyber threat alert

Bangladesh Bank issues alert on cyber threat. In its alert the central bank said, according to Bangladesh cyber security intelligence (BCSI)’s observation, some banks customers are victim to unauthorized transaction through Facebook ad manager.

In this situation, Bangladesh Bank notifies the banks to take precautionary action to secure the account as well as advise to the followings:

F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities

F5 plans to acquire CalypsoAI, which offers adaptive AI security solutions. CalypsoAI's technology will be added to F5's Application Delivery...
Read More
F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities

AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Attacks

The Villager framework, an AI-powered penetration testing tool, integrates Kali Linux tools with DeepSeek AI to automate cyber attack processes....
Read More
AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Attacks

CVE-2025-21043
Samsung Patched Critical Zero-Day Flaw Exploited in Android Attacks

Samsung released its monthly Android security updates, addressing a vulnerability exploited in zero-day attacks. CVE-2025-21043 (CVSS score: 8.8) is a...
Read More
CVE-2025-21043  Samsung Patched Critical Zero-Day Flaw Exploited in Android Attacks

Albania appoints world’s first AI minister, “Diella” to Tackle Corruption

Albania has appointed the first AI-generated government minister to help eliminate corruption. Diella, the digital assistant meaning Sun, has been...
Read More
Albania appoints world’s first AI minister, “Diella” to Tackle Corruption

L7 DDoS Botnet Hijacked 5.76M Devices for Large Attacks

On September 1, 2025, Qrator Lab identified and managed a major attack from the largest L7 DDoS botnet seen so...
Read More
L7 DDoS Botnet Hijacked 5.76M Devices for Large Attacks

Palo Alto Networks User-ID Credential Agent Vuln Exposes password In Cleartext

A new vulnerability, CVE-2025-4235, in Palo Alto Networks’ User-ID Credential Agent for Windows, could reveal a service account's password in...
Read More
Palo Alto Networks User-ID Credential Agent Vuln Exposes password In Cleartext

CyberVolk Ransomware Attacks CII In Japan, France, and UK

CyberVolk ransomware, which appeared in May 2024, has increased attacks on government agencies and critical infrastructures in Japan, France, and...
Read More
CyberVolk Ransomware Attacks CII In Japan, France, and UK

Microsoft warns of active directory and office vulnarability

Microsoft has issued a new warning about a critical security vulnerability in Active Directory Domain Services, known as CVE-2025-21293. An...
Read More
Microsoft warns of active directory and office vulnarability

(CVE-2025-10159)
Sophos Addressed Critical Auth Bypass flaw in Wireless Access Points

Sophos fixed an authentication bypass vulnerability in its AP6 Series Wireless Access Points, preventing attackers from obtaining admin privileges. The...
Read More
(CVE-2025-10159)  Sophos Addressed Critical Auth Bypass flaw in Wireless Access Points

1.6M fitness phone call recordings exposed online

Security researcher Jeremiah Fowler discovered a database containing sensitive information from gym customers and staff, including names, financial details, and...
Read More
1.6M fitness phone call recordings exposed online

i. Information Sharing: Notify to Bangladesh Bank in case of any potential data breach or ransomware
attack immediately. Send information about detailed account of any related incidents, including the
scope, affected data, and any steps taken to address the issue.

ii. Enhanced Verification: Use enhanced security methods, such as biometric authentication and required
CVV verification for each transaction.

iii. Use of OTP: Use One Time Password (OTP) for each transaction.

iv. Use of2FA/MFA: Use 2FA/MFA for any financial transaction.

v. Limit Number of Attempts: Determine how many times a card number can fail verification before
being blocked or blacklisted.

vi. Advanced Fraud Detection Systems: Use Al and machine learning (if possible) to detect unusual
trends in Bank Identification Number (BIN) attacks.

vii. Monitor Transaction Patterns: Regularly examine transaction patterns for irregularities that could
indicate a BIN attack, such as an unexpectedly high number of denied transactions.

viii. Secure BIN Sharing: Limit the amount of BIN data exchanged with merchants and keep it safe to avoid unauthorized access.
ix. Aware of false QR Code: Aware customer and banks employees of false QR Code (e.g. Qshing Attacks).

x. Educate Merchants: Give merchants training and tools on how to detect and respond to potential BIN attacks.

xi. Internal Assessment: Conduct an immediate internal vulnerability and compromise assessment within
your Bank to ensure the security of your systems and data. Indentify any vulnerabilities or potential areas of concern that that may make you susceptible to ransomware attacks.

xii. Cyber Security Measures: Review and reinforce your existing cyber security measures, including firewalls, intrusion detection systems, intrusion prevention systems, and access controls. Ensure they are up to date and capable of withstanding evolving cyber threats. Ensure robust security measures in place to protect your sensitive data and to have plan in place to address a potential data breach or ransomware attack.

xiii. Security Awareness: Conduct regular security awareness training for your employees to educate then on identifying and mitigating potential cyber security threats, such as phishing emails or suspicious attachments.

xiv. Incident Response Planning: Enhance your incident response plan to include specific steps for responding to data breaches and ransomware attacks. Ensure protocols are in place for isolating affected systems, engaging with relevant authorities, and communicating with stakeholders.

xv. Patches Update: Install Patches and Update Software and systems regularly. Ensure Security of website and web based systems, ensure the security of all workstations and endpoints of your bank

xvi. Monitoring by 24/7: Ensure strict network and user activity monitoring by 24/7, especially during non- office hours, and watch out for any indication of data exfiltration.

xvii. Collaboration: Establish a collaborative approach among the relevant organizations, cyber security
experts, and authorities to share information, best practices, and resources in addressing potential threats.

Bangladeshi Social media flooded with unauthorized withdrawals from bank accounts

Check Also

2024

Google reports 97 zero-days exploited in 2024, 50% in spyware attacks

Google’s Threat Intelligence Group (GTIG) reported that in the year 2024, attackers exploited 75 zero-day …