Tuesday , September 17 2024

CTF challenge
“Bonk police” secure first place CTFBD at MIST

Capture the flag CTF-2023 and Cyber Security Conference was held at MIST in the presence of around 150 participants from 29 teams. The event started on Saturday (November 4) morning ended with the prize distribution in the afternoon.

Team bonk police

“Bonk Police” took first place in the CTF competition securing 2425 points. The members of this team are Sheikh Ali Akbar of Feroz Mia Government College, Golam Rabbi from Rajshahi Medical College, Habibur Rahman from Tech Faring Ltd and Golam rabbi from Haji Azmat Government College.

DESCO faces cyber attack: Customers Data Breach

A recent dark web scan revealed that customer data from Dhaka Electric Supply Company Limited (DESCO) has been exposed. The...
Read More
DESCO faces cyber attack: Customers Data Breach

Alert! Google Fixes GCP Composer Flaw

Tenable Research found and fixed a remote code execution (RCE) vulnerability, called CloudImposer, in Google Cloud Platform (GCP). This flaw...
Read More
Alert! Google Fixes GCP Composer Flaw

CTF in Bangladesh: Unveiling Challenges, Opportunities and remedies

In this article, we won’t dive too deep into the technical aspects of Capture The Flag (CTF) competitions. Instead, we...
Read More
CTF in Bangladesh: Unveiling Challenges, Opportunities and remedies

Bitdefender blog post
Medusa target Fortinet flaw (CVE-2023-48788) for Ransomware Attacks

A recent Bitdefender report reveals that Medusa is still actively attacking and has created a notable presence on both the...
Read More
Bitdefender blog post  Medusa target Fortinet flaw (CVE-2023-48788) for Ransomware Attacks

Ivanti alerts ongoing exploitation of recently patched CAV

Ivanti warned that a recently fixed security flaw in its Cloud Service Appliance (CSA) is being actively exploited. CVE-2024-8190 is...
Read More
Ivanti alerts ongoing exploitation of recently patched CAV

CISA unveils 25 new advisories for Industrial Control Systems

CISA issued 25 ICS advisories on September 12, 2024, detailing current security issues, vulnerabilities, and exploits in Industrial Control Systems....
Read More
CISA unveils 25 new advisories for Industrial Control Systems

Intel Issues Alert on 20+ Vulnerabilities, Urges Firmware Updates

Intel announced over 20 vulnerabilities in its processors and products in security advisories released on Tuesday. The chip giant has...
Read More
Intel Issues Alert on 20+ Vulnerabilities, Urges Firmware Updates

Urgent: GitLab Patches flaws allowing unapproved pipeline Job Execution

GitLab released security updates on Wednesday to fix 17 vulnerabilities, including a critical issue that lets attackers run pipeline jobs...
Read More
Urgent: GitLab Patches flaws allowing unapproved pipeline Job Execution

Fortinet admits data breach after hacker claims to steal 440GB

Fortinet confirmed a data breach after a threat actor claimed to have stolen 440GB of files from its Microsoft SharePoint...
Read More
Fortinet admits data breach after hacker claims to steal 440GB

Gov.t issues high alert on android devices

Indian Computer Emergency Response Team (CERT-In) issued a high-severity alert for android devices on September 11, 2024 highlighting the vulnerabilities...
Read More
Gov.t issues high alert on android devices
Team JKKNIU C7b3r K9!ghts

The team of Jatiya Kabi Kazi Nazrul Islam University (JKKNIU C7b3r K9!ghts) got the 2nd place by getting 2250 points. The members of this group are Yousuf Abdullah, Farhana Mahbuba, Spondan Rema and Talukdar Omar Faruk, all students of the same university.

Team “Team Steamers”

“Team Steamers” took the third place with 2200 points. Rakib Ahmed Riad, Robiul Awal fagun , Munjor Hasan, Faisal Hossain are the members of this team and they belong to “Cyber Bangla”.

There were two seminars on Firmware and Hardware Backdooring and DNS Hijacking Attacks.

𝐌𝐝 𝐑𝐚𝐬𝐞𝐥 𝐁𝐡𝐮𝐲𝐚𝐧 , a distinguished cybersecurity researcher covered the security threats posed by malicious modifications to firmware and hardware in various devices. He discussed how attackers can implant backdoors at the production stage or through firmware updates, allowing them to gain unauthorized access to systems or networks. The discussion included case studies of known backdoors, techniques for inserting and exploiting these vulnerabilities, and strategies for detection and prevention.

𝐏𝐫𝐢𝐚𝐥 𝐈𝐬𝐥𝐚𝐦 𝐊𝐡𝐚𝐧, an Independent Security Researcher and Red Team Member at Synack Inc focuses on the attack methods involving the redirection of DNS queries to malicious websites or servers. He explores how attackers hijack DNS requests to control web traffic, leading to phishing attacks, malware distribution, or interception of confidential information. HE covers the different types of DNS hijacking, such as local, man-in-the-middle, or router hijacking, along with mitigation techniques, such as DNSSEC or trusted DNS resolvers, to protect against such threats.

As a chief guest Major General Saidul Islam, RCDS, NDC, PSC, Commandant, MIST said that the importance of cyber security is increasing day by day. We must always be ready for the needs of the age. CTF provides opportunities to enhance skills in various branches of cyber industry. He said that he was proud to be a part of this event.

One lakh twenty thousand tk were awarded to the winning team, eighty thousand tk to the first runner-up team and sixty thousand tk to the second runner-up team.

Infosecbulletin fell proud to be a media partner of this impactful event.

Check Also

cyber

Cyber Battle Stand Off: BGD e-GOV CIRT 8th globally

An international cyber exercise taking place online as part of the Innovation Space at the …

Leave a Reply

Your email address will not be published. Required fields are marked *