Thursday , January 23 2025

Bangladesh Army presents
CTF BD and cyber security conferences continues at MIST

Today (04 November) Saturday a day long “Flag Hunt-2023” and “cyber security conference” is being held at MIST powered by the IT Directorate, Bangladesh Army. 29 teams from different places across the country are competing among others to secure the first place till 3 PM.

       Pre selected teams

After the CTF,  there are another two event. “take0ver – Elite Research Gathering” a cybersecurity research-based conference and a platform to inspire local researchers to focus more on research in the cybersecurity domain. 𝐏𝐫𝐢𝐚𝐥 𝐈𝐬𝐥𝐚𝐦 𝐊𝐡𝐚𝐧, an Independent Security Researcher and Red Team Member at Synack Inc with over 𝟔 𝐲𝐞𝐚𝐫𝐬 𝐨𝐟 𝐞𝐱𝐩𝐞𝐫𝐢𝐞𝐧𝐜𝐞 will talk on the topic “𝐓𝐡𝐞 𝐀𝐫𝐭 𝐨𝐟 𝐃𝐍𝐒 𝐇𝐢𝐣𝐚𝐜𝐤𝐢𝐧𝐠”.

Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack

Fortinet customers must apply the latest updates, as almost 50,000 management interfaces remain vulnerable to the latest zero-day exploit. The...
Read More
Delay patching leaves about 50,000 Fortinet firewalls to zero-day attack

Daily Security Update Dated: 21.01.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated: 21.01.2025

126 Linux kernel Vulns Allow Attackers Exploit 78 Linux Sub-Systems

Ubuntu 22.04 LTS users are advised to update their systems right away due to a crucial security patch from Canonical...
Read More
126 Linux kernel Vulns Allow Attackers Exploit 78 Linux Sub-Systems

CERT-UA alerts about “security audit” requests through AnyDesk

Attackers are pretending to be Ukraine's Computer Emergency Response Team (CERT-UA) using AnyDesk to access target computers. “Unidentified individuals are...
Read More
CERT-UA alerts about “security audit” requests through AnyDesk

Oracle Critical Pre-Release update addressed 320 flaw

Oracle Critical Patch Update Pre-Release Announcement shares details about the upcoming update scheduled for January 21, 2025. Note that this...
Read More
Oracle Critical Pre-Release update addressed 320 flaw

OWASP Reveils Top 10 Smart Contract Vulnerabilities for 2025

OWASP has released its updated list of the top 10 vulnerabilities in smart contracts for 2025. This guide highlights the...
Read More
OWASP Reveils Top 10 Smart Contract Vulnerabilities for 2025

Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Security researchers have found several vulnerabilities in Azure DevOps that could enable attackers to inject CRLF queries and carry out...
Read More
Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Intel holds 22 employees from one Bangladeshi University

Intel Corporation is a leading semiconductor chip manufacturer, employing at least 22 graduates from the Department of Applied Chemistry and...
Read More
Intel holds 22 employees from one Bangladeshi University

VPN Surge 1500% in USA after TikTok Shut Down

vpnMentor’s Research Team is monitoring the potential TikTok ban in the U.S., driven by national security and data privacy issues....
Read More
VPN Surge 1500% in USA after TikTok Shut Down

MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

MITRE launched D3FENDTM 1.0, a cybersecurity framework that provides a vocabulary and understanding of the cyber domain. D3FEND 1.0, funded...
Read More
MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology
    participants at CTF

He has identified major security vulnerabilities in globally recognized companies such as 𝐆𝐨𝐨𝐠𝐥𝐞, 𝐅𝐚𝐜𝐞𝐛𝐨𝐨𝐤, 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭, 𝐓𝐰𝐢𝐭𝐭𝐞𝐫, 𝐘𝐚𝐡𝐨𝐨, 𝐔𝐛𝐞𝐫, 𝐆𝐢𝐭𝐡𝐮𝐛, 𝐂𝐢𝐬𝐜𝐨, and more. Acknowledged by hundreds of companies and listed in over +100 Halls of Fame.

𝐌𝐝 𝐑𝐚𝐬𝐞𝐥 𝐁𝐡𝐮𝐲𝐚𝐧 , a distinguished cybersecurity researcher with over 4 years of expertise in Application Security, Blockchain, Malware Analysis, Digital Forensics, and Incident Response will talk on the topic “𝐇𝐢𝐝𝐝𝐞𝐧 𝐓𝐡𝐫𝐞𝐚𝐭𝐬: 𝙃𝙤𝙬 𝙁𝙞𝙧𝙢𝙬𝙖𝙧𝙚 𝙖𝙣𝙙 𝙃𝙖𝙧𝙙𝙬𝙖𝙧𝙚 𝘽𝙖𝙘𝙠𝙙𝙤𝙤𝙧𝙨 𝘾𝙖𝙣 𝙋𝙚𝙣𝙚𝙩𝙧𝙖𝙩𝙚 𝘼𝙣𝙮 𝙊𝙧𝙜𝙖𝙣𝙞𝙯𝙖𝙩𝙞𝙤𝙣’𝙨 𝘿𝙚𝙛𝙚𝙣𝙨𝙚𝙨 — 𝘼 𝘾𝙖𝙡𝙡 𝙩𝙤 𝘽𝙚𝙬𝙖𝙧𝙚 𝙤𝙛 𝙑𝙚𝙣𝙙𝙤𝙧 𝘾𝙤𝙢𝙥𝙖𝙣𝙞𝙚𝙨.”

   participants at CTF

His remarkable journey includes securing 50+ organizations, including tech giants like Microsoft, Facebook, Apple, Mastercard, Walmart, and Schology.

There is prize giving ceremony after CTF and cyber security conferences today. There may attend Army officials at the event.

Check Also

CPE Seminar Held at ISACA Dhaka Chapter Office Premises

ISACA Dhaka chapter arranged a Continuing Professional Education (CPE) seminar for the community as its …

Leave a Reply

Your email address will not be published. Required fields are marked *