Thursday , June 5 2025

Final approval of the Cyber ​​Security Act in the Cabinet in Bangladesh

The Cabinet has given final approval to the Cyber Security Act. Law Minister Anisul Haque said that the approval was given on Monday (August 28).

He said that the final approval of the Cyber Security Act has been given by making special changes in some sections besides further reducing the sentence of Section 21 of the Digital Security Act.

CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

IBM has issued a security advisory for vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms. These...
Read More
CVSS 9.6: IBM QRadar & Cloud Pak Security Flaws Exposed

ALERT
Thousands of IP addresses compromised nationwide: CIRT warn

As Bangladesh prepares for the extended Eid-ul-Adha holidays, the BGD e-GOV Computer Incident Response Team (CIRT) has issued an urgent...
Read More
ALERT  Thousands of IP addresses compromised nationwide: CIRT warn

New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

In March 2025, the Threatfabric mobile Threat Intelligence team identified Crocodilus, a new Android banking Trojan designed for device takeover....
Read More
New Android Malware ‘Crocodilus’ Targets Banks in 8 Countries

Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Qualcomm has issued security patches for three zero-day vulnerabilities in the Adreno GPU driver, affecting many chipsets that are being...
Read More
Qualcomm Patches 3 Zero-Days Used in Targeted Android Attacks

Critical RCE Flaw Patched in Roundcube Webmail

Roundcube Webmail has fixed a critical security flaw that could enable remote code execution after authentication. Disclosed by security researcher...
Read More
Critical RCE Flaw Patched in Roundcube Webmail

Hacker claim Leak of Deloitte Source Code & GitHub Credentials

A hacker known as "303" claim to breach the company's systems and leaked sensitive internal data on a dark web...
Read More
Hacker claim Leak of Deloitte Source Code & GitHub Credentials

CISA Issued Guidance for SIEM and SOAR Implementation

CISA and ACSC issued new guidance this week on how to procure, implement, and maintain SIEM and SOAR platforms. SIEM...
Read More
CISA Issued Guidance for SIEM and SOAR Implementation

Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

The Qualys Threat Research Unit (TRU) found two local information-disclosure vulnerabilities in Apport and systemd-coredump. Both issues are race-condition vulnerabilities....
Read More
Linux flaws enable password hash theft via core dumps in Ubuntu, RHEL, Fedora

Australia enacts mandatory ransomware payment reporting

New ransomware payment reporting rules take effect in Australia yesterday (May 30) for all organisations with an annual turnover of...
Read More
Australia enacts mandatory ransomware payment reporting

Why Govt Demands Foreign CCTV Firms to Submit Source Code?

Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require...
Read More
Why Govt Demands Foreign CCTV Firms to Submit Source Code?

He said that the final approval of the Cyber Security Act has been given by making special changes in some sections besides further reducing the sentence of Section 21 of the Digital Security Act.

Section 21 of the Digital Security Act states that if a person conducts or supports any kind of propaganda and campaign against Bangladesh’s liberation war, liberation war spirit, father of the nation, national anthem or national flag through digital media, then he shall be imprisoned for not more than 10 years or not more than one crore tk shall be punished with fine or with both.

Earlier, on August 10, at the Bangladesh Computer Council Auditorium, in a press conference about the repeal of the Digital Security Act 2018 and the presentation of the proposed Cyber Security Act 2023.

The Law Minister said that the Cyber Security Act has been enacted to strengthen the security of the cyber world and increase its scope by reducing the misuse of the Digital Security Act.

He also said, ‘In the very beginning of the implementation of digital security laws, we see some abuse or misuse. This I have never hesitated to frankly admit and never will. At that time, we took several important steps to prevent abuse of this law. As a result, the abuse of this law is reduced a lot.

 

 

 

 

Check Also

Financial Threat Assessment 2024
BCSI marks Bangladeshi 28 banks high, 10 medium for cyber attack

Bangladesh Cyber Security Intelligence (BCSI) has published Financial Threat Assessment report for 2024. In an …

Leave a Reply

Your email address will not be published. Required fields are marked *