Saturday , May 10 2025
𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄

Registration open for ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’

𝐓𝐡𝐞 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐥𝐮𝐛 of University of Asia Pacific (UAP) is going to arrange ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’ 𝐂𝐚𝐩𝐭𝐮𝐫𝐞 𝐓𝐡𝐞 𝐅𝐥𝐚𝐠 (𝐂𝐓𝐅) Competition on 3rd may 2025. Registration has been open for the contest, anyone who are qualified as per the contest rule can register through this link.

Actually, it is two phased battle designed for university students in Bangladesh. One is CTF contest and the other one is a seminar session.

YouTube geo-blocks at least 4 Bangladeshi TV channels in India

YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
YouTube geo-blocks at least 4 Bangladeshi TV channels in India

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

𝐄𝐯𝐞𝐧𝐭 𝐒𝐜𝐡𝐞𝐝𝐮𝐥𝐞:
𝐎𝐧𝐥𝐢𝐧𝐞 𝐂𝐨𝐧𝐭𝐞𝐬𝐭: 26th April 2025
𝐎𝐧𝐬𝐢𝐭𝐞 𝐅𝐢𝐧𝐚𝐥 𝐑𝐨𝐮𝐧𝐝 (𝐓𝐨𝐩 𝟑𝟎 𝐓𝐞𝐚𝐦𝐬): 3rd May 2025
𝐕𝐞𝐧𝐮𝐞: University of Asia Pacific (UAP) Plaza

The contest includes Web Exploitation, Cryptography, Forensics, Reverse Engineering, Networking, PWN, and Miscellaneous.

According to the UAP declaration, every team may consist of 2-4 members, where cross-university teams are allowed. The team members must be university students.

After online round t𝐨𝐩 𝟑𝟎 𝐭𝐞𝐚𝐦𝐬 𝐰𝐢𝐥𝐥 𝐪𝐮𝐚𝐥𝐢𝐟𝐲 𝐟𝐨𝐫 𝐭𝐡𝐞 𝐨𝐧𝐬𝐢𝐭𝐞 𝐟𝐢𝐧𝐚𝐥𝐞 round. On the final day (03 may), 4 seminar sessions will be held in the UAP auditorium. The names of the speakers and the topics are as follows:

𝐉𝐚𝐧𝐧𝐲 – Exploiting Context over Mass Fuzzing
𝐌𝐝 𝐑𝐚𝐟𝐢 𝐀𝐡𝐚𝐦𝐞𝐝 – Hunting API Vulnerabilities in the Wild
𝐄𝐧𝐠𝐫. 𝐌. 𝐆𝐨𝐥𝐚𝐦 𝐒𝐨𝐫𝐨𝐰𝐚𝐫 – Hack the Gap — Patch the Future
𝐓𝐚𝐧𝐯𝐢𝐫 𝐇𝐚𝐬𝐬𝐚𝐧 𝐙𝐨𝐡𝐚 – Behind the Screen: Exploring Cyber Security

Seminar registration link: reg.uapcybersiege.com

In the competition, Knight Squad will play the role of CTF partner. Participating in Capture The Flag (CTF) competitions is an excellent way to build real-world cybersecurity skills. These challenges mimic actual attack and defense scenarios, covering areas like cryptography, reverse engineering, web vulnerabilities, and forensics. Unlike traditional learning, CTFs are hands-on and foster creative and critical thinking, similar to real hackers. They also allow for the exploration of new tools in a safe environment. Whether tackling puzzles alone or with a team, CTFs enhance problem-solving, resilience, and collaboration — key qualities in cybersecurity. Additionally, CTF participation is a valuable addition to any resume, attracting recruiters looking for practical experience.

New Security Companies Who Are Exploring the Bangladeshi Market 

Check Also

MIST CyberTron 2025

B1nary_Band1ts secure first for “MIST CyberTron 2025”

MIST Cyber Security Club hosted an exciting MIST CyberTron 2025, featuring a CTF competition, hacking …

Leave a Reply

Your email address will not be published. Required fields are marked *