Sunday , September 21 2025

CTF challenge
“Bonk police” secure first place CTFBD at MIST

Capture the flag CTF-2023 and Cyber Security Conference was held at MIST in the presence of around 150 participants from 29 teams. The event started on Saturday (November 4) morning ended with the prize distribution in the afternoon.

Team bonk police

“Bonk Police” took first place in the CTF competition securing 2425 points. The members of this team are Sheikh Ali Akbar of Feroz Mia Government College, Golam Rabbi from Rajshahi Medical College, Habibur Rahman from Tech Faring Ltd and Golam rabbi from Haji Azmat Government College.

First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

AI-driven malware called 'MalTerminal' utilizes OpenAI's GPT-4 to create harmful code like ransomware and reverse shells, indicating a major change...
Read More
First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cybersecurity researchers revealed a zero-click vulnerability in OpenAI ChatGPT's Deep Research agent that lets attackers leak sensitive Gmail inbox data...
Read More
Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cyber attack disrupts several European airports: check-in and boarding systems affected

Several European airports are experiencing flight delays and cancellations due to a cyber attack on a check-in and boarding systems...
Read More
Cyber attack disrupts several European airports: check-in and boarding systems affected

Hacker claim to breach Link3; 189,000 Users data up for sale

A threat actor claims to have breached Link3, a major IT solutions and internet service provider based in Bangladesh. The...
Read More
Hacker claim to breach Link3; 189,000 Users data up for sale

Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Check point, a cyber security solutions provider hosts an event titled "securing the hyperconnected world in the AI era" at...
Read More
Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Microsoft Confirms 900+ XSS Vulns Found in IT Services

Cross-Site Scripting (XSS) is one of the oldest and most persistent vulnerabilities in modern applications. Despite being recognized for over...
Read More
Microsoft Confirms 900+ XSS Vulns Found in IT Services

Daily Security Update Dated : 15.09.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated : 15.09.2025

IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local privileged users...
Read More
IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

Major Australian Banks using Army of AI Bots to Scam Scammers

Australian banks are now using bots to combat scammers. These bots mimic potential victims to gather real-time information and drain...
Read More
Major Australian Banks using Army of AI Bots to Scam Scammers

F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities

F5 plans to acquire CalypsoAI, which offers adaptive AI security solutions. CalypsoAI's technology will be added to F5's Application Delivery...
Read More
F5 to acquire CalypsoAI for $180M for Advanced AI Security Capabilities
Team JKKNIU C7b3r K9!ghts

The team of Jatiya Kabi Kazi Nazrul Islam University (JKKNIU C7b3r K9!ghts) got the 2nd place by getting 2250 points. The members of this group are Yousuf Abdullah, Farhana Mahbuba, Spondan Rema and Talukdar Omar Faruk, all students of the same university.

Team “Team Steamers”

“Team Steamers” took the third place with 2200 points. Rakib Ahmed Riad, Robiul Awal fagun , Munjor Hasan, Faisal Hossain are the members of this team and they belong to “Cyber Bangla”.

There were two seminars on Firmware and Hardware Backdooring and DNS Hijacking Attacks.

𝐌𝐝 𝐑𝐚𝐬𝐞𝐥 𝐁𝐡𝐮𝐲𝐚𝐧 , a distinguished cybersecurity researcher covered the security threats posed by malicious modifications to firmware and hardware in various devices. He discussed how attackers can implant backdoors at the production stage or through firmware updates, allowing them to gain unauthorized access to systems or networks. The discussion included case studies of known backdoors, techniques for inserting and exploiting these vulnerabilities, and strategies for detection and prevention.

𝐏𝐫𝐢𝐚𝐥 𝐈𝐬𝐥𝐚𝐦 𝐊𝐡𝐚𝐧, an Independent Security Researcher and Red Team Member at Synack Inc focuses on the attack methods involving the redirection of DNS queries to malicious websites or servers. He explores how attackers hijack DNS requests to control web traffic, leading to phishing attacks, malware distribution, or interception of confidential information. HE covers the different types of DNS hijacking, such as local, man-in-the-middle, or router hijacking, along with mitigation techniques, such as DNSSEC or trusted DNS resolvers, to protect against such threats.

As a chief guest Major General Saidul Islam, RCDS, NDC, PSC, Commandant, MIST said that the importance of cyber security is increasing day by day. We must always be ready for the needs of the age. CTF provides opportunities to enhance skills in various branches of cyber industry. He said that he was proud to be a part of this event.

One lakh twenty thousand tk were awarded to the winning team, eighty thousand tk to the first runner-up team and sixty thousand tk to the second runner-up team.

Infosecbulletin fell proud to be a media partner of this impactful event.

Check Also

InfoSecCon 2025

“InfoSecCon-2025″ held successfully promising cyber resilience

“InfoSecCon-2025” was successfully held with tremendous audiences with various time demanding topics and keynotes at …