“Personal Data Protection Act 2023” will be presented to the Cabinet today for approval. it is confirmed by Abu Sayed Md. Kamruzzaman, Director general of Digital security agency. He said to infosecbulletin that as cyber attack is being increased in every second, we have to have a law to protect …
Read More »"Personal Data Protection Act 2023"
Train speed 1000 km per hour
Only 2 hours to travel from Mumbai to Dubai
We travel by train more or less often. For so long, you have seen the metro running under the ground or overhead. Now the train will also run under the water. An underwater train system may soon be implemented. Now you can reach quickly from India to other countries under …
Read More »
CISCO report
Globally, 9 in 10 organizations embraced zero-trust security
Nearly 90% of organizations have started adopting zero-trust security, but there is still a lot of work to be done, says a report from CISCO. 86.5% of global information security professionals have begun implementing parts of the zero-trust security model. However, only 2% have completed their deployments. Cisco measures maturity …
Read More »
HTTP/2 Rapid Reset Attack
Cisco Patched Products Vulnerable to HTTP/2 Rapid Reset Attack
A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. A new technique for launching distributed denial of service (DDoS) attacks has been discovered. It is identified as CVE-2023-44487 and has a high severity rating of 7.5. In addition, this vulnerability …
Read More »
CIRT alert on CVEs
BD CIRT published CVE of f5, Apache, Juniper, Citrix and Atlassian
Bangladesh Government’s Computer Incident Response Team (BGD e-GOV CIRT) proactively releases critical threat intelligence information to ensure the security of Bangladesh’s cyberspace. Following this, CIRT has recently identified critical vulnerabilities for critical information infrastructure (CII). CIRT published cyber alert for critical information infrastructure (CII) on Thursday (23 November). The report …
Read More »Microsoft launches new bounty program with $20,000 rewards
Microsoft has launched a bug bounty program for the Microsoft Defender security platform. Rewards range from $500 to $20,000. Microsoft has the authority to decide how much money people will receive as a reward for finding and reporting vulnerabilities. The amount will depend on how serious the vulnerability is, how …
Read More »
Securelist report
Modern Asian APT groups’ tactics, techniques and procedures
Research is regularly published about Asian APT groups targeting organizations from different industries. These campaigns and incidents don’t only happen in one region. Research like this usually includes detailed information about the tools used by APT actors, the vulnerabilities they exploit, and sometimes even specific attribution. Despite the abundance of …
Read More »
Treasury Board of Canada Secretariat statment
Canadian government discloses data breach
The Canadian government reported that two contractors have been hacked, revealing sensitive information of an unknown number of government employees. Last month, there were security breaches that affected two companies: Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & Moving Services. These companies provide relocation services to Canadian government …
Read More »Cisco launched AI Readiness Index, Check it now!
The Cisco AI Readiness Index is based on a double-blind survey of 8,161 business leaders with responsibility for AI integration and deployment at organizations with 500 or more employees based across 30 markets globally. The Index uses six pillars, each with an individual weightage, to benchmark AI readiness – Strategy …
Read More »CSA Launches First Zero Trust Certification
CSA has introduced the CCZT, which is the industry’s first zero trust certification. CSA explained that the certification addresses the changing world of widespread technology and the shortcomings of outdated security approaches. Its goal is to provide security experts with the necessary knowledge to create and execute a zero trust …
Read More »