Author name: Central Dashborad

অর্থনীতি ও ব্যবসা

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — namedAisuru,Kimwolf,JackSkidandMossad— are responsible for a series of recent record-smashing distributed denial-of-service […]

তথ্য প্রযুক্তি ও সাইবার নিরাপত্তা

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language. Experts say the wiper campaign against Iran materialized this

অর্থনীতি ও ব্যবসা

UK sanctions Xinbi marketplace linked to Asian scam centers

The United Kingdom’s Foreign, Commonwealth and Development Office (FCDO) has sanctioned Xinbi, a Chinese-language cryptocurrency-based online marketplace that sells stolen data and satellite internet equipment to scam networks in Southeast Asia. […] সূত্র: Bleeping Computer ক্যাটাগরি: অর্থনীতি ও ব্যবসা

তথ্য প্রযুক্তি ও সাইবার নিরাপত্তা

Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website

Cybersecurity researchers have disclosed a vulnerability in Anthropic’s Claude Google Chrome Extension that could have been exploited to trigger malicious prompts simply by visiting a web page. The flaw “allowed any website to silently inject prompts into that assistant as if the user wrote them,” Koi Security researcher Oren Yomtov said in a report shared

তথ্য প্রযুক্তি ও সাইবার নিরাপত্তা

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

Most teams have security tools in place. Alerts are firing, dashboards look clean, threat intel is flowing in. On the surface, everything feels under control. But one question usually stays unanswered: Would your defenses actually stop a real attack? That’s where things get shaky. A control exists, so it’s assumed to work. A detection rule

জাতীয়

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in telecom networks to conduct espionage against government networks. The strategic positioning activity, which involves implanting and maintaining stealthy access mechanisms within critical environments, has been attributed to Red Menshen, a threat cluster that’s also tracked as Earth Bluecrow, সূত্র: The

অর্থনীতি ও ব্যবসা

India, Dhaka should address sensitive issues with sincerity, candour: Envoy

Bangladesh High Commissioner Riaz Hamidullah emphasized sincere dialogue on trade, security, and resource sharing for a prosperous future built on shared democratic beliefs. He highlighted the need for mutual respect and interdependence, recalling India’s crucial support during Bangladesh’s 1971 Liberation War and the spirit of equality and justice. সূত্র: Times of India ক্যাটাগরি: অর্থনীতি ও

Scroll to Top