Saturday , February 22 2025

CTF challenge
“Bonk police” secure first place CTFBD at MIST

Capture the flag CTF-2023 and Cyber Security Conference was held at MIST in the presence of around 150 participants from 29 teams. The event started on Saturday (November 4) morning ended with the prize distribution in the afternoon.

Team bonk police

โ€œBonk Policeโ€ took first place in the CTF competition securing 2425 points. The members of this team are Sheikh Ali Akbar of Feroz Mia Government College, Golam Rabbi from Rajshahi Medical College, Habibur Rahman from Tech Faring Ltd and Golam rabbi from Haji Azmat Government College.

B1ackโ€™s Stash Releases 1 Million Credit Cards on a Deep Web Forum

On February 19, 2025, the illegal marketplace B1ack's Stash released over 1 million unique stolen credit and debit card details...
Read More
B1ackโ€™s Stash Releases 1 Million Credit Cards on a Deep Web Forum

Cisco Confirms
Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

Cisco Talos reported thatย  Salt Typhoon, also known as FamousSparrow and GhostEmperor, has been spying on U.S. telecommunication providers using...
Read More
Cisco Confirms  Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

AWS Key Hunter
Test this free automated tool to hunt for exposed AWS secrets

A free tool is now available to scan public GitHub repositories for exposed AWS credentials.ย Security engineer Anmol Singh Yadav created...
Read More
AWS Key Hunter  Test this free automated tool to hunt for exposed AWS secrets

Check Point Flaw Used to Deploy ShadowPad and Ransomware

An unknown threat cluster has targeted European healthcare organizations, deploying PlugX and ShadowPad. In some cases, these intrusions resulted in...
Read More
Check Point Flaw Used to Deploy ShadowPad and Ransomware

CVE-2024-12284
Citrix Issues Security Update for NetScaler Console

Citrix has issued security updates for a serious vulnerability in the NetScaler Console and NetScaler Agent that could allow privilege...
Read More
CVE-2024-12284  Citrix Issues Security Update for NetScaler Console

CISA and FBI ALERT
Ghost ransomware to breach organizations in 70 countries

The FBI and CISA reported on Wednesday that the ransomware group Ghost has been exploiting software and firmware vulnerabilities as...
Read More
CISA and FBI ALERT  Ghost ransomware to breach organizations in 70 countries

Hacker chains multiple vulns to attack Palo Alto Firewall

Palo Alto Networks has issued urgent warnings about threat actors to exploit vulnerabilities in PAN-OS, the operating system powering its...
Read More
Hacker chains multiple vulns to attack Palo Alto Firewall

150 Gov.t Portal affected
Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

Indian government and educational websites, along with reputable financial brands, have experienced SEO poisoning, causing user traffic to be redirected...
Read More
150 Gov.t Portal affected  Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

The Cyber Threat Intelligence Unit of BGD e-GOV CIRT has found 600 vulnerable PRTG instances in Bangladesh, affected by the...
Read More
CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

Builder claims Rs 150 cr for data loss; AWS faces FIR In Bengaluru

Amazon Web Services (AWS) has been named in an FIR after a builder claimed damages to the tune of Rs...
Read More
Builder claims Rs 150 cr for data loss;  AWS faces FIR In Bengaluru
Team JKKNIU C7b3r K9!ghts

The team of Jatiya Kabi Kazi Nazrul Islam University (JKKNIU C7b3r K9!ghts) got the 2nd place by getting 2250 points. The members of this group are Yousuf Abdullah, Farhana Mahbuba, Spondan Rema and Talukdar Omar Faruk, all students of the same university.

Team โ€œTeam Steamersโ€

“Team Steamers” took the third place with 2200 points. Rakib Ahmed Riad, Robiul Awal fagun , Munjor Hasan, Faisal Hossain are the members of this team and they belong to “Cyber Bangla”.

There were two seminars on Firmware and Hardware Backdooring and DNS Hijacking Attacks.

๐Œ๐ ๐‘๐š๐ฌ๐ž๐ฅ ๐๐ก๐ฎ๐ฒ๐š๐ง , a distinguished cybersecurity researcher covered the security threats posed by malicious modifications to firmware and hardware in various devices. He discussed how attackers can implant backdoors at the production stage or through firmware updates, allowing them to gain unauthorized access to systems or networks. The discussion included case studies of known backdoors, techniques for inserting and exploiting these vulnerabilities, and strategies for detection and prevention.

๐๐ซ๐ข๐š๐ฅ ๐ˆ๐ฌ๐ฅ๐š๐ฆ ๐Š๐ก๐š๐ง, an Independent Security Researcher and Red Team Member at Synack Inc focuses on the attack methods involving the redirection of DNS queries to malicious websites or servers. He explores how attackers hijack DNS requests to control web traffic, leading to phishing attacks, malware distribution, or interception of confidential information. HE covers the different types of DNS hijacking, such as local, man-in-the-middle, or router hijacking, along with mitigation techniques, such as DNSSEC or trusted DNS resolvers, to protect against such threats.

As a chief guest Major General Saidul Islam, RCDS, NDC, PSC, Commandant, MIST said that the importance of cyber security is increasing day by day. We must always be ready for the needs of the age. CTF provides opportunities to enhance skills in various branches of cyber industry. He said that he was proud to be a part of this event.

One lakh twenty thousand tk were awarded to the winning team, eighty thousand tk to the first runner-up team and sixty thousand tk to the second runner-up team.

Infosecbulletin fell proud to be a media partner of this impactful event.

Check Also

Agile Cyber Drill 2025

Registration open for 1st Agile Cyber Drill 2025

Registration open for “1st Agile Cyber Drill-2025” scheduled for February 26, 2025 online with an …

Leave a Reply

Your email address will not be published. Required fields are marked *