Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
On October 16th, 2017, a research paper with the title of “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2” was made publicly available. This paper discusses seven vulnerabilities affecting session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These vulnerabilities may...
Read more
ব্লু হোয়েল : প্রয়োজনীয় সতর্কতা
ব্লু হোয়েল কী? ব্লু হোয়েল সোশ্যাল মিডিয়াভিত্তিক একটি ডিপওয়েব গেম। যেসব কম বয়সী ছেলেমেয়ে অবসাদে ভোগে তারাই সাধারণত এতে আসক্ত হয়ে পড়েন। ভারতে ব্লু হোয়েলে আসক্ত হয়ে আত্মঘাতী কয়েক তরুণের সুইসাইডাল নোটে লেখা হয়েছে, ব্লু হোয়েলে ঢোকা যায়, বের হওয়া যায় না। জানা যায়, ব্লু হোয়েল গেমে ৫০টি ধাপ রয়েছে।...
Read more
BGD e-GOV CIRT has successfully participated on OIC CERT Cyber Security Drill 2017
The Organization of Islamic Cooperation – Computer Emergency Response Teams (OIC-CERT) CYBER SECURITY DRILL is an annual event for OIC-CERT members to build a better and secure Cybersecurity ecosystem, including the capacity in incident handling with suitable and comprehensive response as well as engaging better collaboration and coordination among CSIRT...
Read more
BGD e-GOV CIRT has received operational membership from APCERT
Bangladesh Computer Council (BCC) is taking necessary measures to improve Bangladesh’s capability to manage the risks related to digital revolution and deal with fast growing cybercrime. Bangladesh e-Government Computer Incident Response Team (BGD e-GOV CIRT) was established at BCC under the project “Leveraging ICT for Growth, Employment and Governance Project...
Read more
BGD e-GOV CIRT has received full membership from OIC-CERT
Bangladesh Computer Council (BCC) is taking necessary measures to improve Bangladesh’s capability to manage the risks related to digital revolution and deal with fast growing cybercrime. Bangladesh e-Government Computer Incident Response Team (BGD e-GOV CIRT) was established at BCC under the project “Leveraging ICT for Growth, Employment and Governance Project...
Read more
Cross-Platform Malware Adwind RAT !!!
Threat Level Medium Security experts at TrendMicro discovered that the notorious Adwind RAT has resurfaced targeting enterprises in the Aerospace industries worldwide. Adwind is a cross-platform Remote Access Trojan written in Java, it was detected recently in attacks against aerospace enterprises in Switzerland, Austria, Ukraine, and the US. The Adwind RAT was first...
Read more
Petya র্যানসমওয়্যার ও সতর্কতামূলক পদক্ষেপ
Threat Level High Petya র্যানসমওয়্যার কিঃ সাইবার সিকিউরিটি গবেষকগন ২০১৬ সালে প্রথম Petya ভাইরাস এর উপস্থিতি লক্ষ্য করেন। কিন্তু বর্তমান Petya র্যানসমওয়্যার কেবল কম্পিউটার (মাইক্রোসফটের অপারেটিং সিস্টেম উইন্ডোজ চালিত ) এর বিভিন্ন ফাইল কে শুধু এনক্রিপ্টই করেনা, সাথে এটি মাস্টার বুট রেকর্ড (MBR) কে আক্রান্ত করে, এটি MBR কে ওভাররাইট করে এবং এমএফটি (মাস্টারফাইলট্রি) টেবিলকে এনক্রিপ্ট করে...
Read more
Erebus Ransomware Targets Linux Servers
The IT security researchers at Trend Micro recently discovered malware that has the potential to infect Linux-based servers. The malware, called Erebus, has been responsible for hijacking 153 Linux-based networks of a South Korean web-hosting company called NAYANA. Erebus has reached new heights by having the ability to bypass not...
Read more
BCC has signed an Agreement to set up Cyber Security Incidents Investigation Laboratory in Bangladesh
Leveraging ICT for Growth, Employment and Governance Project under Bangladesh Computer Council has signed an agreement with Northern European consortium of INVL Technology managed companies Norway Registers Development AS (NRD AS) and BAIP signed for “Supply, Installation and commissioning of software & various equipment for setting up CIRT Laboratory at...
Read more
Microsoft releases additional updates to protect against potential nation-state activity
On May 12, 2017, the WannaCrypt ransomware served as an all too real example of the danger of cyber attacks to individuals and businesses globally. In reviewing the updates for this month, some vulnerabilities were identified that pose elevated risk of cyber attacks by government organizations, sometimes referred to as...
Read more