Tuesday , January 21 2025

Bangladesh Army presents
CTF BD and cyber security conferences continues at MIST

Today (04 November) Saturday a day long “Flag Hunt-2023” and “cyber security conference” is being held at MIST powered by the IT Directorate, Bangladesh Army. 29 teams from different places across the country are competing among others to secure the first place till 3 PM.

       Pre selected teams

After the CTF,  there are another two event. “take0ver – Elite Research Gathering” a cybersecurity research-based conference and a platform to inspire local researchers to focus more on research in the cybersecurity domain. 𝐏𝐫𝐢𝐚𝐥 𝐈𝐬𝐥𝐚𝐦 𝐊𝐡𝐚𝐧, an Independent Security Researcher and Red Team Member at Synack Inc with over 𝟔 𝐲𝐞𝐚𝐫𝐬 𝐨𝐟 𝐞𝐱𝐩𝐞𝐫𝐢𝐞𝐧𝐜𝐞 will talk on the topic “𝐓𝐡𝐞 𝐀𝐫𝐭 𝐨𝐟 𝐃𝐍𝐒 𝐇𝐢𝐣𝐚𝐜𝐤𝐢𝐧𝐠”.

Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Security researchers have found several vulnerabilities in Azure DevOps that could enable attackers to inject CRLF queries and carry out...
Read More
Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Intel holds 22 employees from one Bangladeshi University

Intel Corporation is a leading semiconductor chip manufacturer, employing at least 22 graduates from the Department of Applied Chemistry and...
Read More
Intel holds 22 employees from one Bangladeshi University

VPN Surge 1500% in USA after TikTok Shut Down

vpnMentor’s Research Team is monitoring the potential TikTok ban in the U.S., driven by national security and data privacy issues....
Read More
VPN Surge 1500% in USA after TikTok Shut Down

MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

MITRE launched D3FENDTM 1.0, a cybersecurity framework that provides a vocabulary and understanding of the cyber domain. D3FEND 1.0, funded...
Read More
MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

AWS Patches Multiple Vulns in WorkSpaces, AppStream 2.0

Amazon Web Services (AWS) has recently fixed two major security vulnerabilities in its cloud services: Amazon WorkSpaces, Amazon AppStream 2.0,...
Read More
AWS Patches Multiple Vulns in WorkSpaces, AppStream 2.0

Malware Trends Review 2024: Ever Recorded Cyber Threats

Last year saw a significant rise in cyber threats, with malware becoming more advanced and attack strategies more sophisticated. A...
Read More
Malware Trends Review 2024: Ever Recorded Cyber Threats

Botnet Exploits 13,000 MikroTik Devices Abusing Misconfigured DNS

A recent Infoblox Threat Intel report reveals a sophisticated botnet that exploits DNS misconfigurations to spread malware widely. This botnet,...
Read More
Botnet Exploits 13,000 MikroTik Devices Abusing Misconfigured DNS

CVE-2024-9042
Code Execution Vulnerability Found in Kubernetes Windows Nodes

A new security flaw traced, CVE-2024-9042, poses a serious risk to Kubernetes clusters with Windows worker nodes. It has a...
Read More
CVE-2024-9042  Code Execution Vulnerability Found in Kubernetes Windows Nodes

Hacker leaked 15k config files and VPN passwords of FortiGate firewall device

The hacking group "Belsen Group" has posted over 15,000 unique FortiGate firewall configurations online. The data dump, reportedly obtained by exploiting...
Read More
Hacker leaked 15k config files and VPN passwords of FortiGate firewall device

Registration open for 1st Agile Cyber Drill 2025

Registration open for "1st Agile Cyber Drill-2025" scheduled for February 26, 2025 online with an awards ceremony for 9 March...
Read More
Registration open for 1st Agile Cyber Drill 2025
    participants at CTF

He has identified major security vulnerabilities in globally recognized companies such as 𝐆𝐨𝐨𝐠𝐥𝐞, 𝐅𝐚𝐜𝐞𝐛𝐨𝐨𝐤, 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭, 𝐓𝐰𝐢𝐭𝐭𝐞𝐫, 𝐘𝐚𝐡𝐨𝐨, 𝐔𝐛𝐞𝐫, 𝐆𝐢𝐭𝐡𝐮𝐛, 𝐂𝐢𝐬𝐜𝐨, and more. Acknowledged by hundreds of companies and listed in over +100 Halls of Fame.

𝐌𝐝 𝐑𝐚𝐬𝐞𝐥 𝐁𝐡𝐮𝐲𝐚𝐧 , a distinguished cybersecurity researcher with over 4 years of expertise in Application Security, Blockchain, Malware Analysis, Digital Forensics, and Incident Response will talk on the topic “𝐇𝐢𝐝𝐝𝐞𝐧 𝐓𝐡𝐫𝐞𝐚𝐭𝐬: 𝙃𝙤𝙬 𝙁𝙞𝙧𝙢𝙬𝙖𝙧𝙚 𝙖𝙣𝙙 𝙃𝙖𝙧𝙙𝙬𝙖𝙧𝙚 𝘽𝙖𝙘𝙠𝙙𝙤𝙤𝙧𝙨 𝘾𝙖𝙣 𝙋𝙚𝙣𝙚𝙩𝙧𝙖𝙩𝙚 𝘼𝙣𝙮 𝙊𝙧𝙜𝙖𝙣𝙞𝙯𝙖𝙩𝙞𝙤𝙣’𝙨 𝘿𝙚𝙛𝙚𝙣𝙨𝙚𝙨 — 𝘼 𝘾𝙖𝙡𝙡 𝙩𝙤 𝘽𝙚𝙬𝙖𝙧𝙚 𝙤𝙛 𝙑𝙚𝙣𝙙𝙤𝙧 𝘾𝙤𝙢𝙥𝙖𝙣𝙞𝙚𝙨.”

   participants at CTF

His remarkable journey includes securing 50+ organizations, including tech giants like Microsoft, Facebook, Apple, Mastercard, Walmart, and Schology.

There is prize giving ceremony after CTF and cyber security conferences today. There may attend Army officials at the event.

Check Also

CPE Seminar Held at ISACA Dhaka Chapter Office Premises

ISACA Dhaka chapter arranged a Continuing Professional Education (CPE) seminar for the community as its …

Leave a Reply

Your email address will not be published. Required fields are marked *