in Publications
Ransomware Landscape: A Data-Driven Threat Analysis of Bangladesh 2023
Get the Full PDF Here Ransomware Landscape – A Data-Driven Threat Analysis of Bangladesh 2023: Read in Flipbook mode from below
Get the Full PDF Here Ransomware Landscape – A Data-Driven Threat Analysis of Bangladesh 2023: Read in Flipbook mode from below
On 04 October 2023, H.E. Mr. Pranay Verma, High Commissioner of India to Bangladesh visited BGD e-GOV CIRT premises. CIRT team had the opportunity to briefly describe their operations and achievements. Mr. Zunaid Ahmed Palak MP, Honorable State Minister of ICT Division, Bangladesh, accompanied the team along with many other high officials.
গত ২০-২৪ মার্চ ২০২২ তারিখে BGD e-GOV CIRT অর্থ বিভাগের iBAS++ এর জন্য Information Systems Audit এর উপর ৫ দিন ব্যাপি প্রশিক্ষণের অয়োজন করে । সেখানে iBAS++ এর কর্মকর্তারা অংশ গ্রহণ করে। প্রশিক্ষণ শেষে অংশগ্রহণকারীদের মাঝে সনদ বিতরন করা হয়।
DESCRIPTION: Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution. SYSTEM AFFECTED: * Agile Product Lifecycle Management Integration Pack for Oracle E-Business Suite, version 3.6 * Application Performance Management, versions 13.4.1.0, 13.5.1.0 * Big Data Spatial and Graph, versions prior to 23.1 * Enterprise Manager Base Platform, versions 13.4.0.0, 13.5.0.0 * Enterprise Manager Ops Center, version 12.4.0.0 * Fujitsu...
Read More
DESCRIPTION: Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR), and Thunderbird, the most severe of which could allow for arbitrary code execution. * Mozilla Firefox is a web browser used to access the Internet. * Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. * Mozilla Thunderbird is an email client. Successful...
Read More
DESCRIPTION: Multiple vulnerabilities have been discovered in Cisco Products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow an unauthenticated, remote attacker to execute code on the affected systems. Depending on the privileges associated with the targeted user, an attacker could then install programs; view, change, or delete data; or create new...
Read More
The government of Bangladesh has identified cybersecurity as one of the most serious economic and national security challenges that the country is facing.