English articles


5W & 1H of Phishing Campaign

5W & 1H of Phishing Campaign

A phishing campaign is a kind of scam ran through email and intended to snip personal information from victims. Phishing basically depend on a vulnerability we can never fully abolish- human mistakes. The theme of the attack or the lure to attract human errors to commit the mistake depends on...

Read more


FIRST Annual CTF-2020: BGD e-Gov CIRT Secured 19th Place

FIRST Annual CTF-2020: BGD e-Gov CIRT Secured 19th Place

As being a full member of FIRST, Bangladesh Government’s Cyber Security unit BGD e-GOV CIRT took part in annual CTF and achieved 19th position among 278 teams from all over the world. FIRST is the global Forum of Incident Response and Security Teams. It is an international confederation of trusted computer...

Read more


Critical Infrastructure and Control Systems: How to protect?

Critical Infrastructure and Control Systems: How to protect?

There are many ways to define “Critical Infrastructure,” but what these definitions have in common is most closely conceived of as infrastructure that would affect the economic and national security of a country if it were negatively impacted or eliminated. The U.S. Department of Homeland Security describes critical infrastructure as...

Read more


PCI DSS: Basic Information, Certification, Compliance level & Requirement

PCI DSS: Basic Information, Certification, Compliance level & Requirement

What is PCI DSS? The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express. Governed by the Payment Card Industry Security Standards Council (PCI SSC), the compliance scheme aims to secure...

Read more


Top 10 Malware March 2020

Top 10 Malware March 2020

Top 10 Malware composition was consistent with February 2020 with the exception of Pushdo and Tinba. Overall, the Top 10 Malware variants comprised 42% of Total Malware activity in March, down from 51% in January. It is highly likely that Dridex, Gh0st, Kovter, and ZueS will continue to make up...

Read more


APCERT CYBER DRILL 2020 “BANKER DOUBLES DOWN ON MINER”

APCERT CYBER DRILL 2020 “BANKER DOUBLES DOWN ON MINER”

Dated : 11 March 2020 The Asia Pacific Computer Emergency Response Team (APCERT) today has successfully completed its annual drill to test the response capability of leading Computer Security Incident Response Teams (CSIRT) within the Asia Pacific economies. The theme of this year’s APCERT Drill is “Banker doubles down on...

Read more


The Effect of Geopolitics on Cybersecurity

The Effect of Geopolitics on Cybersecurity

The Effect of Geopolitics on Cybersecurity Technological growth and its breakthrough advances, along with their advantages, also have disadvantages, which are obvious examples of communication equipment. In fact, today, the Internet, telephones, cell phones and other communication devices can be described as a double-edged sword used to facilitate communications on...

Read more


Role Based Access Control (RBAC) in Elastic Stack

Role Based Access Control (RBAC) in Elastic Stack

We are all familiar with the Elastic Stack for various purposes. Today, I will let you know about a feature which was previously paid one, but in Elastic Stack 7.0 it has been made free. Role based access control is a feature which will allow users to have permission in...

Read more


APWG Phishing Activity Trends Reports for Q3’19 Raise Alarm

APWG Phishing Activity Trends Reports for Q3’19 Raise Alarm

For a long period of time phishing is one of the major cyber threats in cyberspace. Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.[1] For past few years we have...

Read more


Page 1 of 612345...Last »