60% of Bangladesh’s CEOs believe the country’s economic growth will decline this year, while 36% expect it to increase. According to 57% of Bangladeshi CEOs, their businesses can survive the next 10 years under current conditions, while 40% believe their businesses will last more than 10 years if things stay …
Read More »PWC survey
CareEdge Ratings study
India data center capacity to double in 3 years
India’s data center industry is set to double from about 0.9 Gigawatts in 2023 to almost 2 Gigawatts by 2026. Over the next three years, it is expected that $6 billion will be invested to expand capacities. India currently holds a data center capacity share of only 3% globally despite …
Read More »CISA releases draft rule for cyber incident reporting
The Cybersecurity and Infrastructure Security Agency (CISA) published a 447-page document of regulations according to the Cyber Incident Reporting for Critical Infrastructure Act in the Federal Register for public comment. The law passed in 2022 aims to enhance the government’s capability to monitor incidents and ransomware payments. Homeland Security Secretary …
Read More »CISA Releases Four Industrial Control Systems Advisories
CISA published four advisories on March 26, 2024, about security problems, vulnerabilities, and exploits in Industrial Control Systems (ICS). ICSA-24-086-01 Automation-Direct C-MORE EA9 HMI ICSA-24-086-02 Rockwell Automation PowerFlex 527 ICSA-24-086-03 Rockwell Automation Arena Simulation ICSA-24-086-04 Rockwell Automation FactoryTalk View ME CISA encourages users and administrators to review the newly released …
Read More »
Checkmarx blog post
170K+ Python Developers GitHub Accounts Hacked
The Checkmarx Research team found out that hackers attacked the software supply chain and managed to breach the Top.gg GitHub organization, which has over 170,000 users, and also targeted individual developers. These hackers took over accounts by stealing browser cookies, added bad code with verified commits, created a fake Python …
Read More »Microsoft to limit access 50 cloud services for Russia: TASS
Microsoft to restrict access to 50 of its cloud products in Russia, as reported by the Russian company Softline. The restrictions will also affect local software, with the deactivation of license keys. Russian media TASS reported the list primarily includes corporate applications such as those for business management, accounting, automation, …
Read More »Microsoft releases emergency fix for Windows Server crashes
Microsoft released urgent updates to fix a problem causing Windows domain controllers to crash after installing the March 2024 Windows Server security updates. Microsoft released the following emergency Windows Server cumulative updates that should fix the LSASS memory leak and prevent impacted servers from crashing and restarting: KB5037422 (Windows Server …
Read More »29 0-days Uncovered : Hackers Earned $1,132,500 at Pwn2Own
Pwn2Own Vancouver 2024 hacking competition is over. Hackers earned $1,132,500 for showing 29 unique zero-days. Participants in the Pwn2Own Vancouver 2024 hacking competition earned $1,132,500 for demonstrating 29 unique zero-days. On the first day, Team Synacktiv successfully demonstrated exploits against a Tesla car. The researcher Manfred Paul (@_manfp) won the …
Read More »
Investigation committee formed
Justin Trudeau’s birth place Pabna, Bangladesh; Birth certificate issued
Justin Trudeau is the current Prime Minister of Canada but according to a recently issued birth certificate his birth place is in Pabna. Surprising but true such an birth certificate has been issued by Ahmedpur Union Parishad in Pabna. As shown in the birth certificate, name is Justin Trudeau, father- …
Read More »CISA, FBI, and MS-ISAC Release Joint Guidance on DDoS
CISA, FBI, and MS-ISAC updated a guide to help organizations defend against DDoS attacks. The guidance now includes detailed insight into three different types of DDoS techniques: Volumetric, attacks aiming to consume available bandwidth. Protocol, attacks which exploit vulnerabilities in network protocols. Application, attacks targeting vulnerabilities in specific applications or …
Read More »