Friday , July 11 2025
InfoSecCon 2025

“InfoSecCon-2025″ held successfully promising cyber resilience

“InfoSecCon-2025” was successfully held with tremendous audiences with various time demanding topics and keynotes at Dhaka on 16 May- 2025. The conference was fueled with 3 keynotes, 2 panel discussions and Q&A sessions makes the conference more dynamics.

On the keynote on “Blockchain Technology: Enhancing Security in the Financial Sector” said, Blockchain technology is a revolutionary innovation that improves security in the financial sector. It functions as a decentralized, distributed, and immutable ledger that records transactions across many computers.

AMD discloses 4 new CPU flaws Affecting Many CPUs

AMD has revealed four new vulnerabilities that could enable attackers to access sensitive data via timing-based side-channel attacks. These vulnerabilities,...
Read More
AMD discloses 4 new CPU flaws Affecting Many CPUs

GitLab patched XSS and Authorization Bypass Flaws

GitLab has released security updates for its Community Edition (CE) and Enterprise Edition (EE) to fix vulnerabilities that could enable...
Read More
GitLab patched XSS and Authorization Bypass Flaws

CVE-2025-7206
Critical D-Link DIR-825 Router Flaw Remote Crash Via Buffer Overflow

A newly found vulnerability (CVE-2025-7206) in the D-Link DIR-825 router firmware version 2.10 poses a significant risk to home and...
Read More
CVE-2025-7206  Critical D-Link DIR-825 Router Flaw Remote Crash Via Buffer Overflow

Urgently patch now: Zoom Patches 6 Flaws

Zoom released a security update addressing six newly discovered vulnerabilities in its Workplace, Rooms, and SDK products for Windows, macOS,...
Read More
Urgently patch now: Zoom Patches 6 Flaws

Whatsapp rival ‘Bitchat’, message without internet

Jack Dorsey, co-founder of Twitter and Block Head, launched a new peer-to-peer messaging app called Bitchat, which operates solely over...
Read More
Whatsapp rival ‘Bitchat’, message without internet

Splunk Addresses Third-Party Package Vulns in SOAR Versions

Splunk has issued critical security updates for SOAR versions 6.4.0 and 6.4 to fix several vulnerabilities in third-party packages. The...
Read More
Splunk Addresses Third-Party Package Vulns in SOAR Versions

Texas-based Tax Credit Consultancy agency exposed PII, ID Numbers, & SSNs

Cybersecurity researcher Jeremiah Fowler found an unsecured database with 245,949 records, reported to vpnMentor. It likely belonged to a tax...
Read More
Texas-based Tax Credit Consultancy agency exposed PII, ID Numbers, & SSNs

CVE-2025-25257
Fortinet Addresses Major SQL Injection Flaw in FortiWeb

Fortinet has issued a critical patch for a critical vulnerability in its FortiWeb product, a web application firewall commonly used...
Read More
CVE-2025-25257  Fortinet Addresses Major SQL Injection Flaw in FortiWeb

Microsoft July 2025 Patch Tuesday: One zero-day, 137 flaws

Microsoft's Patch Tuesday in July 2025 is critical, featuring updates for 137 vulnerabilities, including a zero-day in Microsoft SQL Server....
Read More
Microsoft July 2025 Patch Tuesday: One zero-day, 137 flaws

Android malware Anatsa infiltrates Google Play targeting banks worldwide

ThreatFabric researchers have discovered a new sophisticated campaign by the Anatsa banking trojan targeting mobile banking users in the U.S....
Read More
Android malware Anatsa infiltrates Google Play targeting banks worldwide

Key advantages include decentralization, which removes single points of failure and makes it harder for attackers to compromise the network. Cryptographic hashing maintains the integrity of transaction blocks; altering one block changes its hash and all subsequent hashes.

On the keynotes BJIT’s head of technology operation demonstrated Amir Hossain presented case studies showcasing how Bangladeshi companies and startups are successfully adopting cloud-native architectures. He highlighted three key sectors:

Fintech firms: using cloud to deliver scalable mobile payment solutions.

E-commerce platforms: ensuring uptime and scalability during peak sales periods.

Telecoms and banks : improving customer management through cloud-native systems.

S. M. Tofayel Ahmad, Additional Director (ICT), Bangladesh Bank highlighted on ‘Rethinking Resilience for the Age of AI-Driven Cyberattacks” not only in banking sector but enterprise, mid and small size organizations.

At InfoSecCon-2025 (3rd Edition), He presented how cyber attacks like interruption, interception, modification, and fabrication impact availability, confidentiality, integrity, and authenticity in network communication. He also addressed the rising risks of AI-powered attacks, the need for AI-based defenses, and the growing cybersecurity skills gap.

There was a panel discussion on ‘Rethinking Resilience for the Age of AI-Driven Cyberattacks”. The panelists said, AI is changing the digital landscape but also creating more advanced cyber threats. These AI-driven attacks are quicker and can bypass traditional security systems, requiring a shift from mere prevention to rapid detection, response, and recovery.

To enhance resilience, organizations need to integrate AI into their cybersecurity strategies. This includes adopting intelligent threat detection tools, automating incident responses, and using predictive analytics to spot vulnerabilities. A robust digital infrastructure also depends on continuous employee training, real-time threat intelligence sharing, and adaptable cloud-native systems.

There was another panel discussion on “Toward a Secure Hybrid Cloud: Bridging Traditional Data Centers with Cloud in Bangladesh” highlighted Bangladesh’s digital transformation requires a hybrid cloud strategy that combines traditional data centers with cloud services. This approach allows for control over on-premise systems, which is important for compliance and handling sensitive information, while also benefiting from the cloud’s scalability and cost-effectiveness.

Ensuring security through encryption, access management, and compliance with relevant standards is essential. Solutions must be tailored to address Bangladesh’s infrastructure challenges, such as connectivity and cloud literacy. Additionally, training and awareness are necessary for secure adoption. In the end, a secure hybrid cloud architecture will enhance operational efficiency and protect data integrity in Bangladesh’s evolving digital environment.

And lastly the Questions and Answer sessions draw the attention of the audiences. Four panelists were on the stage to answer the questions from the audiences.

As chief guest Shish Hyder Chowdhury, secretary ICT division said, “Our digital journey, while promising immense growth, also introduces new vulnerabilities. The rise in sophisticated cyber threats demands a unified and proactive approach. He said, ICT Division is committed to fostering a resilient cybersecurity ecosystem. This involves strengthening our national infrastructure, enhancing public awareness, and cultivating a skilled cybersecurity workforce. Collaboration between government, industry, and academia is crucial to building robust defenses.”

Director General of national cyber security agency (NCSA) Dr. Taibur Rahman said, National Cybersecurity Agency is committed to fostering a resilient digital ecosystem. This requires strengthening our national defenses, enhancing public awareness, and cultivating a skilled cybersecurity workforce. Collaboration between government, industry, and academia is crucial to effectively address these challenges. We must prioritize building indigenous capabilities and adopting global best practices tailored to our unique context.

As a guest of honor Mr. SHOJI Akihiro, JICA Expert highlighted its future plan on cyber security in Bangladesh.

Check Also

Security Companies

New Security Companies Who Are Exploring the Bangladeshi Market 

BlackHat Asia-2025 was held for four days at the Marina Bay Convention Center in Singapore …

Leave a Reply

Your email address will not be published. Required fields are marked *