Wednesday , July 2 2025

Bangladesh Army presents
CTF BD and cyber security conferences continues at MIST

Today (04 November) Saturday a day long “Flag Hunt-2023” and “cyber security conference” is being held at MIST powered by the IT Directorate, Bangladesh Army. 29 teams from different places across the country are competing among others to secure the first place till 3 PM.

       Pre selected teams

After the CTF,  there are another two event. “take0ver – Elite Research Gathering” a cybersecurity research-based conference and a platform to inspire local researchers to focus more on research in the cybersecurity domain. 𝐏𝐫𝐢𝐚𝐥 𝐈𝐬𝐥𝐚𝐦 𝐊𝐡𝐚𝐧, an Independent Security Researcher and Red Team Member at Synack Inc with over 𝟔 𝐲𝐞𝐚𝐫𝐬 𝐨𝐟 𝐞𝐱𝐩𝐞𝐫𝐢𝐞𝐧𝐜𝐞 will talk on the topic “𝐓𝐡𝐞 𝐀𝐫𝐭 𝐨𝐟 𝐃𝐍𝐒 𝐇𝐢𝐣𝐚𝐜𝐤𝐢𝐧𝐠”.

CYDES 2025
MCSS to implement 6 strategic goals with 7 objectives over 6 year: NACSA Chief

The second day of the Cyber Defence & Security Exhibition and Conference (CYDES) 2025 further cemented Malaysia’s position as a...
Read More
CYDES 2025  MCSS to implement 6 strategic goals with 7 objectives over 6 year: NACSA Chief

CYDES 2025
Malaysia placed cybersecurity heart of the regional agenda: DPM Ahmad Zahid

Malaysia's Deputy Prime Minister Datuk Seri Dr. Ahmad Zahid Hamidi said that Malaysia has placed cybersecurity at the heart of...
Read More
CYDES 2025  Malaysia placed cybersecurity heart of the regional agenda: DPM Ahmad Zahid

Amid Meta moves; OpenAI is largely shutting down next week: Wired

Mark Chen, the chief research officer at OpenAI, sent a forceful memo to staff on Saturday, promising to go head-to-head...
Read More
Amid Meta moves; OpenAI is largely shutting down next week: Wired

Canada orders Hikvision to close operations over national security

The Canadian government ordered Hikvision to stop all operations in the country due to national security concerns. Hikvision, based in...
Read More
Canada orders Hikvision to close operations over national security

First couple “Rosie” to conceive using AI tech “STAR” successfully

Doctors at Columbia University Fertility Center have reported what they are calling the first pregnancy using a new AI system,...
Read More
First couple “Rosie” to conceive using AI tech “STAR” successfully

Scattered Spider Actively Attacking Aviation and Transportation: FBI

Cybersecurity experts and federal authorities are warning that the Scattered Spider hackers are now targeting aviation and transportation, indicating a...
Read More
Scattered Spider Actively Attacking Aviation and Transportation: FBI

Russia’s restrictions on Cloudflare making websites inaccessible

Since June 9, 2025, Russian users connecting to Cloudflare services have faced throttling by ISPs. As the throttling is being...
Read More
Russia’s restrictions on Cloudflare making websites inaccessible

61 million Verizon records allegedly posted online for sale

A new report from SafetyDetectives reveals that hackers posted a massive 3.1GB dataset online, containing about 61 million records reportedly...
Read More
61 million Verizon records allegedly posted online for sale

Cyber Expert ‘Rene Joshilda’ Arrested for Bomb Hoaxes

A 30-year-old robotics engineer from Chennai set off alarm bells in 11 states by allegedly sending hoax bomb threats. She...
Read More
Cyber Expert ‘Rene Joshilda’ Arrested for Bomb Hoaxes

Critical RCE Flaws in Cisco ISE and ISE-PIC Allow to Gain Root Access

Cisco has issued updates to fix two critical security vulnerabilities in Identity Services Engine (ISE) and ISE Passive Identity Connector...
Read More
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow to Gain Root Access
    participants at CTF

He has identified major security vulnerabilities in globally recognized companies such as 𝐆𝐨𝐨𝐠𝐥𝐞, 𝐅𝐚𝐜𝐞𝐛𝐨𝐨𝐤, 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭, 𝐓𝐰𝐢𝐭𝐭𝐞𝐫, 𝐘𝐚𝐡𝐨𝐨, 𝐔𝐛𝐞𝐫, 𝐆𝐢𝐭𝐡𝐮𝐛, 𝐂𝐢𝐬𝐜𝐨, and more. Acknowledged by hundreds of companies and listed in over +100 Halls of Fame.

𝐌𝐝 𝐑𝐚𝐬𝐞𝐥 𝐁𝐡𝐮𝐲𝐚𝐧 , a distinguished cybersecurity researcher with over 4 years of expertise in Application Security, Blockchain, Malware Analysis, Digital Forensics, and Incident Response will talk on the topic “𝐇𝐢𝐝𝐝𝐞𝐧 𝐓𝐡𝐫𝐞𝐚𝐭𝐬: 𝙃𝙤𝙬 𝙁𝙞𝙧𝙢𝙬𝙖𝙧𝙚 𝙖𝙣𝙙 𝙃𝙖𝙧𝙙𝙬𝙖𝙧𝙚 𝘽𝙖𝙘𝙠𝙙𝙤𝙤𝙧𝙨 𝘾𝙖𝙣 𝙋𝙚𝙣𝙚𝙩𝙧𝙖𝙩𝙚 𝘼𝙣𝙮 𝙊𝙧𝙜𝙖𝙣𝙞𝙯𝙖𝙩𝙞𝙤𝙣’𝙨 𝘿𝙚𝙛𝙚𝙣𝙨𝙚𝙨 — 𝘼 𝘾𝙖𝙡𝙡 𝙩𝙤 𝘽𝙚𝙬𝙖𝙧𝙚 𝙤𝙛 𝙑𝙚𝙣𝙙𝙤𝙧 𝘾𝙤𝙢𝙥𝙖𝙣𝙞𝙚𝙨.”

   participants at CTF

His remarkable journey includes securing 50+ organizations, including tech giants like Microsoft, Facebook, Apple, Mastercard, Walmart, and Schology.

There is prize giving ceremony after CTF and cyber security conferences today. There may attend Army officials at the event.

Check Also

NID services

OTP glitch disrupted NID services across the country

NID services in Bangladesh are temporarily suspended due to issues with delivering One-Time Passwords (OTP) …

Leave a Reply

Your email address will not be published. Required fields are marked *