Author Archives: CIRT Team



CIRT Team

in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending...

Read more

0
11 Apr 2021
in Security Advisories & Alerts

Hangover Threat Group IOC

Short Description: Hangover threat group (aka Neon, Viceroy Tiger, MONSOON) carrying out targeted cyberattacks deploying BackConfig malware attacks against government and military organizations in South Asia including Bangladesh. Hangover Group is a cyberespionage group that was first observed in December 2013 carrying on a cyberattack against a telecom corporation in...

Read more

0
11 Apr 2021
The signing of an MoU between Cyber Wales and the BGD e-GOV CIRT
in Articles, English articles, News

The signing of an MoU between Cyber Wales and the BGD e-GOV CIRT

The state-run Bangladesh e-Government Computer Incident Response Team (BGD e-Gov CIRT) and Cyber Wales in the United Kingdom signed a memorandum of understanding (MoU) recently to mark the 50th anniversary of Bangladesh’s Independence Day. The MoU will help reinforce the bilateral relations in various fields including economic, investment, protection against...

Read more

0
11 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in the Google Androidoperating system (OS), the most severe of which could allow for remotecode execution. Android is an operating system developed by Google formobile devices, including, but not limited to, smartphones, tablets, andwatches. Successful exploitation of the most severe of thesevulnerabilities could allow for...

Read more

0
08 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Cisco SD-WAN vManage Software Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Cisco SD-WAN vManageSoftware, the most severe of which could allow for arbitrary codeexecution. Cisco SD-WAN provides a centralized management interface ofan organization’s WAN including their cloud and data center environment.Successful exploitation of the most severe of these vulnerabilitiescould allow an unauthenticated, remote attacker to...

Read more

0
08 Apr 2021
in Security Advisories & Alerts

Threat actor group “ALTDOS” targeting Bangladesh

Threat actor group “ALTDOS” operate by accessing and exfiltrating companies databases and have focus mainly on South-East Asia including Bangladesh.“ALTDOS” is known to extort companies for ransom for the data exfiltrated. Not much is known about this group, other than the breach reports. Target sectors: Financial-services,retail,communications,construction,energy,pharmaceuticals,telecommunications External Reference relared to...

Read more

0
08 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in VMware vRealize Operations Manager Could Allow for Remote Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in VMware vRealizeOperations Manager, which could result in remote code execution. VMwarevRealize Operations Manager is an IT management platform which enablesvisibility, optimization and management of an organization’s physical,virtual and cloud infrastructure. This software comes within an APIwhich enables developers to build vRealize Operations Manager clients...

Read more

0
07 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Cisco Jabber Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Cisco Jabber the mostsevere of which could allow for arbitrary code execution. Cisco Jabberprovides instant messaging (IM), voice, video, voice messaging, desktopsharing, and conferencing on any device. Successful exploitation of themost severe of these vulnerabilities could allow an unauthenticated,remote attacker to execute code on...

Read more

0
07 Apr 2021
Page 3 of 13412345...102030...Last »