by CIRT Team
CYBER RESILIENCE IN ASIA-PACIFIC
Cyber resilience effort and strategy have traditionally been considered from the position of enabling governments and businesses to deliver the intended outcomes despite disruptions to information and communication systems. There has also been a general focus on the security and resilience of critical information infrastructures, such as industrial control systems, supervisory control, and data acquisition systems, and also on vital sectors, such as telecommunications, banking,...
Read More
by CIRT Team
CYBER THREAT REPORT
Click below to download the report:
by CIRT Team
CTFd.io: An interactive learning tool for Cybersecurity
Through the 4th industrial revolution is in full swing, data security has become more imperative and challenging. Computer Science education has been expanded similarly to different branches like Cybersecurity. In this article, we are going to discuss a tech tool, CTFd.io which is being used extensively in this field as a problem-solving, learning, and assessment platform focusing on information security concepts only. In this particular...
Read More
by CIRT Team
Traditional VAPT VS Effective Security Testing & Assessment Program For Enterprises
“Cybersecurity Professionals Need To Win Every Time, But An Attacker Only Need To Win Once!!!” Now a days VAPT becomes more essential tasks required for the organizations to keep their Cyber/ IT enabled Information Systems secure against the ongoing cyber threats. Performing VAPT is also treated as mandatory requirement by some compliances like as PCI-DSS. Gaps in traditional VAPT “Cost of an Exploitation Always Much...
Read More
by CIRT Team
IoT Possibility and Challenges in Bangladesh context
Introduction: We are on the verge of the Fourth Industrial Revolution. Smart technologies are taking us to a world that has tremendous opportunities for everybody. With opportunity there comes challenges also. We have to make sure that we overcome challenges to take advantage and grab our fair share of the opportunity. What is IoT? Though almost all of us have heard about IoT, some...
Read More
by CIRT Team
BGD e-GOV CIRT has successfully organized country’s First National Cyber Drill 2020, Capture The Flag
National Cyber Drill 2020, Bangladesh (NCD 2020) was organized by the BGD e-GOV CIRT on 12-13 December 2020 on the occasion of Digital Bangladesh Day. The drill was to help build the resilience against growing cyber threats. The drill will also help create cyber security awareness and cultivate new crops of cyber experts. The drill was successful in identifying the hidden talents of the budding...
Read More
by CIRT Team
Egregor Ransomware
Egregor is a ransomware from the Sekhmet malware family that has been active since the middle of September 2020. The ransomware group hacks into companies, steals information, and finally encrypts all the data. The level of sophistication of their attacks, adaptability to infect such a broad range of victims, and significant increase in their activity suggests that Egregor ransomware operators have been developing their malware...
Read More
by CIRT Team
Cyber Wales Cluster meeting Webinar with Middle East November 2020
On 1st November 2020 Cyber Wales, an UK based cyber security organization, has arranged a webinar to celebrate UAE’s Flag Day, a national campaign to honor the country’s past, present and future. Flag Day is celebrated on November 3, the anniversary of HH Sheikh Khalifa bin Zayed Al Nahyan becoming the president of the UAE in 2004. Objective The aim of sessions is for Cyber...
Read More
by CIRT Team
Things to know about Security Intelligence
Security Intelligence is the collection, evaluation, and response to data generated on an organization’s network undergoing potential security threats in real-time. This platform was developed from log management, SIEMs, NBADs, and network forensics. As cybersecurity threats and attacks continue to grow and evolve, advanced security solutions are more important than ever, with security intelligence leading the way. [1] Key Principles Real-time analysis Pre-exploit analysis Collection,...
Read More