Monday , April 21 2025
๐”๐€๐ ๐‚๐˜๐๐„๐‘ ๐’๐ˆ๐„๐†๐„

Registration open for โ€˜๐”๐€๐ ๐‚๐˜๐๐„๐‘ ๐’๐ˆ๐„๐†๐„ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“โ€™

๐“๐ก๐ž ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐ฅ๐ฎ๐› of University of Asia Pacific (UAP) is going to arrange โ€˜๐”๐€๐ ๐‚๐˜๐๐„๐‘ ๐’๐ˆ๐„๐†๐„ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“โ€™ ๐‚๐š๐ฉ๐ญ๐ฎ๐ซ๐ž ๐“๐ก๐ž ๐…๐ฅ๐š๐  (๐‚๐“๐…) Competition on 3rd may 2025. Registration has been open for the contest, anyone who are qualified as per the contest rule can register through this link.

Actually, it is two phased battle designed for university students in Bangladesh. One is CTF contest and the other one is a seminar session.

Hackers Exploit Zoom’s Remote Control Feature for System Access

ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom's remote control feature to access victims'...
Read More
Hackers Exploit Zoom’s Remote Control Feature for System Access

Registration open for โ€˜๐”๐€๐ ๐‚๐˜๐๐„๐‘ ๐’๐ˆ๐„๐†๐„ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“โ€™

๐“๐ก๐ž ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‚๐ฅ๐ฎ๐› of University of Asia Pacific (UAP) is going to arrange โ€˜๐”๐€๐ ๐‚๐˜๐๐„๐‘ ๐’๐ˆ๐„๐†๐„ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“โ€™ ๐‚๐š๐ฉ๐ญ๐ฎ๐ซ๐ž ๐“๐ก๐ž...
Read More
Registration open for โ€˜๐”๐€๐ ๐‚๐˜๐๐„๐‘ ๐’๐ˆ๐„๐†๐„ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“โ€™

Samsung phone is saving your passwords in plain text

You copy a password from your manager, thinking it's safe. Meanwhile, your phone is saving it in plain text. Samsung...
Read More
Samsung phone is saving your passwords in plain text

UK Software Firm Exposed 8 million of Healthcare Worker Records

A data leak involving 8 million UK healthcare worker records, including IDs and financial information, was caused by a misconfigured...
Read More
UK Software Firm Exposed 8 million of Healthcare Worker Records

GitHub Enterprise Server Vulns Expose Risk of Code Execution

GitHub has released security updates for GitHub Enterprise Server to fix several vulnerabilities, including a high-severity flaw that could allow...
Read More
GitHub Enterprise Server Vulns Expose Risk of Code Execution

CVE-2025-2492
ASUS warns of critical auth bypass flaw in routers

Hackers can exploit a vulnerability in Asus routers to execute unauthorized functions. This serious issue, rated 9.2 out of 10,...
Read More
CVE-2025-2492  ASUS warns of critical auth bypass flaw in routers

16,000+ Fortinet devices compromised with symlink backdoor, Mostly in Asia

According to Shadowserver Foundation around 17,000 Fortinet devices worldwide have been compromised using a new technique called "symlink". This number...
Read More
16,000+  Fortinet devices compromised with symlink backdoor, Mostly in Asia

Patch now! Critical Erlang/OTP SSH Vuln Allows UCE

A critical security flaw has been found in the Erlang/Open Telecom Platform (OTP) SSH implementation, allowing an attacker to run...
Read More
Patch now! Critical Erlang/OTP SSH Vuln Allows UCE

CISA warns of increasing risk tied to Oracle legacy Cloud leak

On Wednesday, CISA alerted about increased breach risks due to the earlier compromise of legacy Oracle Cloud servers, emphasizing the...
Read More
CISA warns of increasing risk tied to Oracle legacy Cloud leak

CVE-2025-20236
Cisco Patches Unauthenticated RCE Flaw in Webex App

Cisco issued a security advisory about a serious vulnerability in its Webex App that allows unauthenticated remote code execution (RCE)...
Read More
CVE-2025-20236  Cisco Patches Unauthenticated RCE Flaw in Webex App

๐„๐ฏ๐ž๐ง๐ญ ๐’๐œ๐ก๐ž๐๐ฎ๐ฅ๐ž:
๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐‚๐จ๐ง๐ญ๐ž๐ฌ๐ญ: 26th April 2025
๐Ž๐ง๐ฌ๐ข๐ญ๐ž ๐…๐ข๐ง๐š๐ฅ ๐‘๐จ๐ฎ๐ง๐ (๐“๐จ๐ฉ ๐Ÿ‘๐ŸŽ ๐“๐ž๐š๐ฆ๐ฌ): 3rd May 2025
๐•๐ž๐ง๐ฎ๐ž: University of Asia Pacific (UAP) Plaza

The contest includes Web Exploitation, Cryptography, Forensics, Reverse Engineering, Networking, PWN, and Miscellaneous.

According to the UAP declaration, every team may consist of 2-4 members, where cross-university teams are allowed. The team members must be university students.

After online round t๐จ๐ฉ ๐Ÿ‘๐ŸŽ ๐ญ๐ž๐š๐ฆ๐ฌ ๐ฐ๐ข๐ฅ๐ฅ ๐ช๐ฎ๐š๐ฅ๐ข๐Ÿ๐ฒ ๐Ÿ๐จ๐ซ ๐ญ๐ก๐ž ๐จ๐ง๐ฌ๐ข๐ญ๐ž ๐Ÿ๐ข๐ง๐š๐ฅ๐ž round. On the final day (03 may), 4 seminar sessions will be held in the UAP auditorium. The names of the speakers and the topics are as follows:

๐‰๐š๐ง๐ง๐ฒ โ€“ Exploiting Context over Mass Fuzzing
๐Œ๐ ๐‘๐š๐Ÿ๐ข ๐€๐ก๐š๐ฆ๐ž๐ โ€“ Hunting API Vulnerabilities in the Wild
๐„๐ง๐ ๐ซ. ๐Œ. ๐†๐จ๐ฅ๐š๐ฆ ๐’๐จ๐ซ๐จ๐ฐ๐š๐ซ โ€“ Hack the Gap โ€” Patch the Future
๐“๐š๐ง๐ฏ๐ข๐ซ ๐‡๐š๐ฌ๐ฌ๐š๐ง ๐™๐จ๐ก๐š โ€“ Behind the Screen: Exploring Cyber Security

In the competition, Knight Squad will play the role of CTF partner. Participating in Capture The Flag (CTF) competitions is an excellent way to build real-world cybersecurity skills. These challenges mimic actual attack and defense scenarios, covering areas like cryptography, reverse engineering, web vulnerabilities, and forensics. Unlike traditional learning, CTFs are hands-on and foster creative and critical thinking, similar to real hackers. They also allow for the exploration of new tools in a safe environment. Whether tackling puzzles alone or with a team, CTFs enhance problem-solving, resilience, and collaboration โ€” key qualities in cybersecurity. Additionally, CTF participation is a valuable addition to any resume, attracting recruiters looking for practical experience.

New Security Companies Who Are Exploring the Bangladeshi Marketย 

Check Also

Hacked 101

RedSentry presents
Hacked 101 Seminar Successfully Ended at UITS

The cybersecurity seminar “RedSentry presents: Hacked 101,” organized by RedSentry with the University of Information …

Leave a Reply

Your email address will not be published. Required fields are marked *