Author Archives: CIRT Team



CIRT Team

BGD e-Gov CIRT Arranged Four Days of Training on “Cybersecurity and Secure Computer User” For Bangladesh Army
in Bangla Articles, News

BGD e-Gov CIRT Arranged Four Days of Training on “Cybersecurity and Secure Computer User” For Bangladesh Army

গত ১৩ -১৬ মার্চ ২০২২ তারিখে BGD e-GOV CIRT বাংলাদেশ সেনাবাহিনির এর জন্য Secure Computer User এর উপর ৪ দিন ব্যাপি প্রশিক্ষণের অয়োজন করে । সেখানে Army Information Technology Support Organization এর কর্মকর্তারা অংশ গ্রহণ করে।

0
21 Mar 2022
BGD e-Gov CIRT Arranged Three Days of Training on “Cybersecurity and Secure Computer User”
in English articles, News

BGD e-Gov CIRT Arranged Three Days of Training on “Cybersecurity and Secure Computer User”

BGD e-Gov CIRT arranged a three days training on “Cybersecurity and Secure Computer User” for 20 officials of Information and Communication Technology Division from 22nd February 2022 to 24th February 2022. Senior Secretary of ICT Division N M Zeaul Alam PAA inaugurated the capacity building training for ICT Division. Joint Secretary, Deputy Secretary and other officials of ICT Division participated in the training.

0
28 Feb 2022
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Android OS Could Allow for Escalation of Privilege

DESCRIPTION: Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for escalation of privilege. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for escalation of privilege. Depending on the privileges associated with...

Read More

0
15 Feb 2022
in Security Advisories & Alerts

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Adobe products, themost severe of which could allow for Arbitrary Code Execution. * Premiere Rush is a video editor.* Illustrator is a vector graphics editor and design program.* Photoshop is a graphics editor.* Adobe After Effects is a digital visual effects, motion graphics, andcompositing application.* Creative Cloud is a cloud service provided by Adobe where its softwarecan be accessed...

Read More

0
09 Feb 2022
in Security Advisories & Alerts

Critical Patches Issued for Microsoft Products, February 08, 2022

DESCRIPTION:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for remote code execution in thecontext of the logged on user. Depending on the privileges associatedwith the user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Users whoseaccounts are configured to have fewer user rights on the system could beless impacted...

Read More

0
09 Feb 2022
in Security Advisories & Alerts

A Vulnerability in Samba Could Allow for Arbitrary Code Execution

DESCRIPTION:A vulnerability has been discovered in Samba which could allow forarbitrary code execution. Samba is the standard Windows interoperabilitysuite of programs for Linux and Unix. Successful exploitation of thisvulnerability could result in arbitrary code execution as root onaffected Samba installations that use the VFS module vfs_fruit.Depending on the permission associated with the application running theexploit, an attacker could then install programs; view, change, ordelete data....

Read More

0
09 Feb 2022
in Security Advisories & Alerts

A Backdoor in WordPress AccessPress Plugins and Themes Could Allow an Attacker Access to a Targeted Website

DESCRIPTION:A backdoor has been discovered in WordPress AccessPress plugins andthemes, which could allow an attacker access to a targeted website.AccessPress plugins and themes are used to provide website functionalityand design options to website administrators. Successful exploitation ofthis backdoor could allow an attacker to redirect users to malicioussites as well as access to the vulnerable website. SYSTEM AFFECTED:* accesspress-anonymous-post 2.8.0* accesspress-custom-css 2.0.1* ** accesspress-custom-post-type 1.0.8* accesspress-facebook-auto-post...

Read More

0
09 Feb 2022
in Security Advisories & Alerts

Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Cisco Products, themost severe of which could allow for arbitrary code execution.Successful exploitation of the most severe of these vulnerabilitiescould allow an unauthenticated, remote attacker to execute code on theaffected systems. Depending on the privileges associated with thetargeted user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Usersconfigured to...

Read More

0
09 Feb 2022
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...

Read More

0
09 Feb 2022
Page 5 of 8« First...34567...Last »