DESCRIPTION:A vulnerability has been discovered in F5Networks BIG-IP, which couldresult in a denial-of-service (DoS). BIG-IP is a family of productscovering software and hardware designed around application availability,access control, and security solutions. Successful exploitation of thisvulnerability could allow an attacker to cause a denial of service toall servers sitting behind the...
Read more
DESCRIPTION:Multiple vulnerabilities have been discovered in Adobe products, themost severe of which could allow for Arbitrary Code Execution. * Acrobat and Reader is a family of application software and Webservices mainly used to create, view, and edit PDF documents.* Illustrator is a vector graphics editor and design program.* Bridge is...
Read more
DESCRIPTION:Multiple vulnerabilities have been discovered in Distributed DataSystems WebHMI, the most severe of which could allow for arbitrary codeexecution. Distributed Data Systems WebHMI is a SCADA system with abuilt-in web server that allows you to monitor and control anyautomation system on the local network and via the Internet from yourcomputer...
Read more
DESCRIPTION:Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR), and Thunderbird, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be...
Read more
DESCRIPTION:Multiple vulnerabilities have been discovered in Apple Products, themost severe of which could allow for arbitrary code execution. * iOS is a mobile operating system for mobile devices, including theiPhone, iPad, and iPod touch.* iPadOS is the successor to iOS 12 and is a mobile operating system foriPads.* macOS Monterey...
Read more
Cyber resilience effort and strategy have traditionally been considered from the position of enabling governments and businesses to deliver the intended outcomes despite disruptions to information and communication systems. There has also been a general focus on the security and resilience of critical information infrastructures, such as industrial control systems,...
Read more
সাম্প্রতিক সময়ে সাইবার আক্রমন বেড়ে যাওয়ায় বিভিন্ন প্রতিষ্ঠান নিজেদের তথ্য নিরাপত্তা নিশ্চিত করতে বিভিন্ন উপায় অবলম্বন করছে। তন্মধ্যে প্রতিষ্ঠানের ব্যবহারকারীদের সচেতনতা বৃদ্ধি ও সাইবার নিরাপত্তা কর্মীদের হাতে কলমে প্রশিক্ষন অন্যতম। সাইবার নিরাপত্তা কর্মীদের হাতে কলমে প্রশিক্ষন ও মুল্যায়নের মাধ্যম হিসেবে Capture The Flag (CTF) বিশ্বজুড়ে জনপ্রিয় ও বহুল সমাদৃত একটি...
Read more