Friday , May 9 2025

Bangladesh Army presents
CTF BD and cyber security conferences continues at MIST

Today (04 November) Saturday a day long “Flag Hunt-2023” and “cyber security conference” is being held at MIST powered by the IT Directorate, Bangladesh Army. 29 teams from different places across the country are competing among others to secure the first place till 3 PM.

       Pre selected teams

After the CTF,  there are another two event. “take0ver – Elite Research Gathering” a cybersecurity research-based conference and a platform to inspire local researchers to focus more on research in the cybersecurity domain. 𝐏𝐫𝐢𝐚𝐥 𝐈𝐬𝐥𝐚𝐦 𝐊𝐡𝐚𝐧, an Independent Security Researcher and Red Team Member at Synack Inc with over 𝟔 𝐲𝐞𝐚𝐫𝐬 𝐨𝐟 𝐞𝐱𝐩𝐞𝐫𝐢𝐞𝐧𝐜𝐞 will talk on the topic “𝐓𝐡𝐞 𝐀𝐫𝐭 𝐨𝐟 𝐃𝐍𝐒 𝐇𝐢𝐣𝐚𝐜𝐤𝐢𝐧𝐠”.

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition
    participants at CTF

He has identified major security vulnerabilities in globally recognized companies such as 𝐆𝐨𝐨𝐠𝐥𝐞, 𝐅𝐚𝐜𝐞𝐛𝐨𝐨𝐤, 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭, 𝐓𝐰𝐢𝐭𝐭𝐞𝐫, 𝐘𝐚𝐡𝐨𝐨, 𝐔𝐛𝐞𝐫, 𝐆𝐢𝐭𝐡𝐮𝐛, 𝐂𝐢𝐬𝐜𝐨, and more. Acknowledged by hundreds of companies and listed in over +100 Halls of Fame.

𝐌𝐝 𝐑𝐚𝐬𝐞𝐥 𝐁𝐡𝐮𝐲𝐚𝐧 , a distinguished cybersecurity researcher with over 4 years of expertise in Application Security, Blockchain, Malware Analysis, Digital Forensics, and Incident Response will talk on the topic “𝐇𝐢𝐝𝐝𝐞𝐧 𝐓𝐡𝐫𝐞𝐚𝐭𝐬: 𝙃𝙤𝙬 𝙁𝙞𝙧𝙢𝙬𝙖𝙧𝙚 𝙖𝙣𝙙 𝙃𝙖𝙧𝙙𝙬𝙖𝙧𝙚 𝘽𝙖𝙘𝙠𝙙𝙤𝙤𝙧𝙨 𝘾𝙖𝙣 𝙋𝙚𝙣𝙚𝙩𝙧𝙖𝙩𝙚 𝘼𝙣𝙮 𝙊𝙧𝙜𝙖𝙣𝙞𝙯𝙖𝙩𝙞𝙤𝙣’𝙨 𝘿𝙚𝙛𝙚𝙣𝙨𝙚𝙨 — 𝘼 𝘾𝙖𝙡𝙡 𝙩𝙤 𝘽𝙚𝙬𝙖𝙧𝙚 𝙤𝙛 𝙑𝙚𝙣𝙙𝙤𝙧 𝘾𝙤𝙢𝙥𝙖𝙣𝙞𝙚𝙨.”

   participants at CTF

His remarkable journey includes securing 50+ organizations, including tech giants like Microsoft, Facebook, Apple, Mastercard, Walmart, and Schology.

There is prize giving ceremony after CTF and cyber security conferences today. There may attend Army officials at the event.

Check Also

𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄

Registration open for ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’

𝐓𝐡𝐞 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐥𝐮𝐛 of University of Asia Pacific (UAP) is going to arrange ‘𝐔𝐀𝐏 …

Leave a Reply

Your email address will not be published. Required fields are marked *