Saturday , March 29 2025

CTF challenge
“Bonk police” secure first place CTFBD at MIST

Capture the flag CTF-2023 and Cyber Security Conference was held at MIST in the presence of around 150 participants from 29 teams. The event started on Saturday (November 4) morning ended with the prize distribution in the afternoon.

Team bonk police

โ€œBonk Policeโ€ took first place in the CTF competition securing 2425 points. The members of this team are Sheikh Ali Akbar of Feroz Mia Government College, Golam Rabbi from Rajshahi Medical College, Habibur Rahman from Tech Faring Ltd and Golam rabbi from Haji Azmat Government College.

FBI investigating cyberattack at Oracle, Bloomberg News reports

The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle (ORCL.N), opens new tab that has led to...
Read More
FBI investigating cyberattack at Oracle, Bloomberg News reports

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

CIRT alert Situational Awareness for Eid Holidays

As the Eid holidays near, cybercriminals may try to take advantage of weakened security during this time. The CTI unit...
Read More
CIRT alert Situational Awareness for Eid Holidays

Cyberattack on Malaysian airports: PM rejected $10 million ransom

Operations at Kuala Lumpur International Airport (KLIA) were unaffected by a cyber attack in which hackers demanded US$10 million (S$13.4...
Read More
Cyberattack on Malaysian airports: PM rejected $10 million ransom

Micropatches released for Windows zero-day leaking NTLM hashes

Unofficial patches are available for a new Windows zero-day vulnerability that allows remote attackers to steal NTLM credentials by deceiving...
Read More
Micropatches released for Windows zero-day leaking NTLM hashes

VMware Patches Authentication Bypass Flaw in Windows Tool

On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools for Windows. CVE-2025-22230 allows a...
Read More
VMware Patches Authentication Bypass Flaw in Windows Tool

IngressNightmare
Over 40% of cloud environments are vulnerable to RCE

Kubernetes users of the Ingress NGINX Controller are advised to fix four newly found remote code execution ( RCE) vulnerabilities,...
Read More
IngressNightmare  Over 40% of cloud environments are vulnerable to RCE

(CVE-2025-29927)
Urgently Patch Your Next.js for Authorization Bypass

Next.js, a widely used React framework for building full-stack web applications, has fixed a serious security vulnerability. Used by many...
Read More
(CVE-2025-29927)  Urgently Patch Your Next.js for Authorization Bypass

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as โ€œrose87168โ€ claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
Oracle refutes breach after hacker claims 6 million data theft
Team JKKNIU C7b3r K9!ghts

The team of Jatiya Kabi Kazi Nazrul Islam University (JKKNIU C7b3r K9!ghts) got the 2nd place by getting 2250 points. The members of this group are Yousuf Abdullah, Farhana Mahbuba, Spondan Rema and Talukdar Omar Faruk, all students of the same university.

Team โ€œTeam Steamersโ€

“Team Steamers” took the third place with 2200 points. Rakib Ahmed Riad, Robiul Awal fagun , Munjor Hasan, Faisal Hossain are the members of this team and they belong to “Cyber Bangla”.

There were two seminars on Firmware and Hardware Backdooring and DNS Hijacking Attacks.

๐Œ๐ ๐‘๐š๐ฌ๐ž๐ฅ ๐๐ก๐ฎ๐ฒ๐š๐ง , a distinguished cybersecurity researcher covered the security threats posed by malicious modifications to firmware and hardware in various devices. He discussed how attackers can implant backdoors at the production stage or through firmware updates, allowing them to gain unauthorized access to systems or networks. The discussion included case studies of known backdoors, techniques for inserting and exploiting these vulnerabilities, and strategies for detection and prevention.

๐๐ซ๐ข๐š๐ฅ ๐ˆ๐ฌ๐ฅ๐š๐ฆ ๐Š๐ก๐š๐ง, an Independent Security Researcher and Red Team Member at Synack Inc focuses on the attack methods involving the redirection of DNS queries to malicious websites or servers. He explores how attackers hijack DNS requests to control web traffic, leading to phishing attacks, malware distribution, or interception of confidential information. HE covers the different types of DNS hijacking, such as local, man-in-the-middle, or router hijacking, along with mitigation techniques, such as DNSSEC or trusted DNS resolvers, to protect against such threats.

As a chief guest Major General Saidul Islam, RCDS, NDC, PSC, Commandant, MIST said that the importance of cyber security is increasing day by day. We must always be ready for the needs of the age. CTF provides opportunities to enhance skills in various branches of cyber industry. He said that he was proud to be a part of this event.

One lakh twenty thousand tk were awarded to the winning team, eighty thousand tk to the first runner-up team and sixty thousand tk to the second runner-up team.

Infosecbulletin fell proud to be a media partner of this impactful event.

Check Also

BCS

Registration Open For BCS CTF 2025

So, to test your cyber security skill, here is another chance to do that. Bangladesh …

Leave a Reply

Your email address will not be published. Required fields are marked *