Windows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
National Crime Agency sting operation infiltrates cyber crime market
Why Veeam thinks ransomware warranty payouts are unlikely
March 22, 2023Government launches seven-year NHS cyber strategy
March 22, 2023Nordics move towards common cyber defence strategy
Ferrari rejects ransom demand after cyber attack
March 21, 2023Ransomware gangs harass victims to ‘bypass’ backups
March 21, 2023BBC cracks down on TikTok after review
March 20, 2023NCSC launches cyber check-up tools for SMEs
March 20, 2023NatWest announces ID service for its customers
March 20, 2023UK TikTok ban gives us all cause to consider social media security
TikTok banned on UK government devices
March 16, 2023BEC attacks doubled in 2022, outstripping ransomware
Microsoft patches Outlook zero-day for March Patch Tuesday
March 15, 2023antivirus software (antivirus program)
Top 10 types of information security threats for IT teams
February 7, 2023How to fix the top 5 cybersecurity vulnerabilities
February 6, 2023How to fix the top 5 cybersecurity vulnerabilities
What to keep in mind when securing virtual environments
February 6, 20238 cybersecurity books to read in 2023
October 28, 2022Student Loan Breach Exposes 2.5M Records
August 31, 2022Watering Hole Attacks Push ScanBox Keylogger
August 30, 2022Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
August 26, 2022Twitter Whistleblower Complaint: The TL;DR Version
August 24, 2022Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
August 22, 2022iPhone Users Urged to Update to Patch 2 Zero-Days
August 19, 2022Google Patches Chrome’s Fifth Zero-Day of the Year
August 18, 20223 ways to help cybersecurity pros avoid burnout
What are the pros and cons of electronic signatures?
July 22, 2022software bill of materials (SBOM)
July 12, 2022SolarWinds hack explained: Everything you need to know
June 29, 2022Do you meet all the modern authentication requirements?
Learn to work with the Office 365 unified audit log
May 23, 2022Windows Server 2022 security hardening guide for admins
10 cybersecurity tips for business travelers
April 22, 2022built-in administrator account
April 18, 2022Get started with Azure AD entitlement management automation
How to train agents on call center fraud detection
December 9, 2021Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
July 12, 2019Google changes Chrome extension policy amid security concerns
Comparing the top SSL VPN products
April 28, 2015Increasing Watering Hole Attacks in Nigeria
March 16, 2023New Phishing Apps Discovered on Google Play Store
January 30, 2023Increasing Cases of Wiperware Infection
January 19, 2023TikTok Challenge Used To Circulate Information-Stealing Malware
December 1, 2022Unofficial WhatsApp Android app Stealing User’s Accounts
October 28, 2022Increased Cases of Accounts Takeover in Nigeria
October 11, 2022Hackers Using Microsoft Edge Malvertising Campaign To Target Users
September 26, 2022Multiple Vulnerabilities Reported in Zoom
September 21, 2022Beware of Malicious Web Browser Extensions
September 13, 2022SharkBot Malware Infiltrates Google Play Store
September 5, 2022Cisco Networks hacked by Yanluowang Ransomware Group
August 12, 2022New HiddenAds Malware on Google Play Store Uncovered
August 8, 2022Microsoft announced End-of-Support for Windows 8.1
July 22, 2022New Whatsapp OTP Scam Using Call Forwarding Trick
June 10, 2022Dangerous Malware Targets Android Devices
June 2, 2022Novel Use of Chatbots in Phishing Schemes
May 23, 2022New Browser-In-The Browser (BITB) Phishing Attacks
March 29, 2022New Zero-Day Chrome Web Browser Vulnerability
February 15, 2022Wordpress Themes and Plugins Vulnerabilities
January 25, 2022SMS-Based Malware Infecting Mobile Devices
January 20, 2022New Windows Installer Zero-Day Vulnerability
November 25, 2021Google Warn Users of Government-Sponsored Attacks
October 16, 2021Browser’s DNS Rebinding Attacks
September 22, 2021Fortinet Leaked VPN Account Credentials
September 10, 2021Russian GRU Global Brute Force Attacks
July 2, 2021Microsoft Edge Browser Vulnerabilities
July 1, 2021Apple Zero-Day Vulnerabilities
May 18, 2021Cellebrite Forensic Software Security Vulnerabilities
April 28, 2021Fake LinkedIn Job Offer Malware
April 12, 2021Microsoft Exchange Servers Zero-Day Vulnerability
March 8, 2021Advisory on Windows Vulnerabilities
February 25, 2021Security Advisory on Apple Chips Malware
February 23, 2021APT Compromise of Orion Platforms
January 1, 2021Security Advisory on Phishing Attacks
December 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020RV Series Routers Command Injection Vulnerabilities
August 5, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020New EvilQuest Ransomware for macOS Systems
July 1, 2020Webex Desktop App Vulnerability
June 24, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Multiple Security Vulnerabilities on D-LINK Home Routers
June 17, 2020Local Privilege Escalation Vulnerability for VMware
June 16, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"