English articles


CYBER RESILIENCE IN ASIA-PACIFIC

Cyber resilience effort and strategy have traditionally been considered from the position of enabling governments and businesses to deliver the intended outcomes despite disruptions to information and communication systems. There has also been a general focus on the security and resilience of critical information infrastructures, such as industrial control systems, supervisory control, and data acquisition systems, and also on vital sectors, such as telecommunications, banking,...

Read More


CTFd.io: An interactive learning tool for Cybersecurity

CTFd.io: An interactive learning tool for Cybersecurity

Through the 4th industrial revolution is in full swing, data security has become more imperative and challenging. Computer Science education has been expanded similarly to different branches like Cybersecurity. In this article, we are going to discuss a tech tool, CTFd.io which is being used extensively in this field as a problem-solving, learning, and assessment platform focusing on information security concepts only. In this particular...

Read More


Traditional VAPT VS Effective Security Testing & Assessment Program For Enterprises

Traditional VAPT VS Effective Security Testing & Assessment Program For Enterprises

“Cybersecurity Professionals Need To Win Every Time, But An Attacker Only Need To Win Once!!!” Now a days VAPT becomes more essential tasks required for the organizations to keep their Cyber/ IT enabled Information Systems secure against the ongoing cyber threats. Performing VAPT is also treated as mandatory requirement by some compliances like as PCI-DSS. Gaps in traditional VAPT “Cost of an Exploitation Always Much...

Read More


IoT Possibility and Challenges in Bangladesh context

IoT Possibility and Challenges in Bangladesh context

Introduction: We are on the verge of the Fourth Industrial Revolution. Smart technologies are taking us to a world that has tremendous opportunities for everybody. With opportunity there comes challenges also. We have to make sure that we overcome challenges to take advantage and grab our fair share of the opportunity.  What is IoT?             Though almost all of us have heard about IoT, some...

Read More


BGD e-GOV CIRT has successfully organized country’s First National Cyber Drill 2020, Capture The Flag

BGD e-GOV CIRT has successfully organized country’s First National Cyber Drill 2020, Capture The Flag

National Cyber Drill 2020, Bangladesh (NCD 2020) was organized by the BGD e-GOV CIRT on 12-13 December 2020 on the occasion of Digital Bangladesh Day. The drill was to help build the resilience against growing cyber threats. The drill will also help create cyber security awareness and cultivate new crops of cyber experts. The drill was successful in identifying the hidden talents of the budding...

Read More


Egregor Ransomware

Egregor Ransomware

Egregor is a ransomware from the Sekhmet malware family that has been active since the middle of September 2020. The ransomware group hacks into companies, steals information, and finally encrypts all the data. The level of sophistication of their attacks, adaptability to infect such a broad range of victims, and significant increase in their activity suggests that Egregor ransomware operators have been developing their malware...

Read More


Cyber Wales Cluster meeting Webinar with Middle East November 2020

Cyber Wales Cluster meeting Webinar with Middle East November 2020

On 1st November 2020 Cyber Wales, an UK based cyber security organization, has arranged a webinar to celebrate UAE’s Flag Day, a national campaign to honor the country’s past, present and future. Flag Day is celebrated on November 3, the anniversary of HH Sheikh Khalifa bin Zayed Al Nahyan becoming the president of the UAE in 2004. Objective The aim of sessions is for Cyber...

Read More


Things to know about Security Intelligence

Things to know about Security Intelligence

Security Intelligence is the collection, evaluation, and response to data generated on an organization’s network undergoing potential security threats in real-time. This platform was developed from log management, SIEMs, NBADs, and network forensics. As cybersecurity threats and attacks continue to grow and evolve, advanced security solutions are more important than ever, with security intelligence leading the way. [1] Key Principles Real-time analysis Pre-exploit analysis Collection,...

Read More


Page 4 of 11« First...23456...10...Last »