Bangladesh Computer Council (BCC) has won “The Award of Distinction in Digital Innovation” in the category of TOGAF standard / Enterprise Architecture from the Open Group, India for the year 2022 for establishing National e-Service Bus. The Open Group India Awards recognizes organizations and teams in the Southeast Asia region that have reached the pinnacle of achievement in applying standards, open-source software, and best practices in Enterprise...
Read More
BGD e-GOV CIRT গত বছরের মত এবারও সকল বিশ্ববিদ্যালয়ের শিক্ষার্থীদের অংশগ্রহণের মাধ্যমে তাদের দক্ষতা বৃদ্ধি ও সাইবার নিরাপত্তার ধারণা দেওয়ার জন্য আগামী ২৩-২৪ আগস্ট ২০২২ তারিখে দুইদিন ব্যাপী University Cyber Drill 2022 আয়োজন করতে যাচ্ছে। এই প্রতিযোগিতায় অংশগ্রহন করতে প্রথমে Registration করে টীম তৈরী করতে হবে। Registration এর জন্য একটি গাইডলাইন এবং প্রতিযোগিতায় অংশগ্রহনের Rules of engagement প্রস্তুত করে CIRT এর ওয়েবসাইটে publish করা হয়েছে।...
Read More
Description:kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Impact: A local attacker may exploit this issue to gain elevated root privileges on the affected system. Mitigation: Updates...
Read More
Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system. CVE-2022-30190, also known as “Follina” — the RCE vulnerability in the Microsoft Windows Support Diagnostic Tool that was disclosed in late May and exploited in the wild — has now received patches for affected Windows systems. While Microsoft had...
Read More
Security researchers have discovered a new Microsoft Office zero-day vulnerability that is being used in attacks to execute maliciously PowerShell commands via Microsoft Diagnostic Tool (MSDT) simply by opening a Word document. Workarounds: In Microsoft Defender’s Attack Surface Reduction (ASR) activating the rule “Block all Office applications from creating child processes” in Block mode will prevent this from being exploited.[https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#block-all-office-applications-from-creating-child-processes] Disable the MSDT URL Protocol....
Read More
CVE-2022-1388: On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Impact: This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands,...
Read More
This report has been created by aggregating the first quarter’s acquired data for 2022 from threat intelligence sources, peer organization feeds, and OSINT assessments. BGD e-GOV CIRT conducted NO penetration testing attempts without well-established rules of engagement for the affected network owners. However, identified IOCs (Indicator of Compromises) were cross-examined by threat intelligence unit researchers for further verification to achieve ‘true positives.’ The sole purpose...
Read More
গত ২২-২৪ মার্চ ২০২২ তারিখে BGD e-GOV CIRT বাংলাদেশ সেনাবাহিনির এর জন্য Basic Cyber Security এর উপর ৩ দিন ব্যাপি প্রশিক্ষণের অয়োজন করে । সেখানে MIST এর কর্মকর্তারা অংশ গ্রহণ করে। প্রশিক্ষণ শেষে অংশগ্রহণকারীদের মাঝে সনদ বিতরন করা হয়।