The Revised Draft Data Protection Bill 2020
8 months agoWindows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Why some jobseekers have turned to cyber crime during the pandemic
What has a year of home working meant for the DPO?
April 12, 2021DOJ: Creep Coach Finagles Nude Athlete Photos
April 9, 2021Data from 500M LinkedIn Users Posted for Sale Online
623M Payment Cards Stolen from Cybercrime Forum
April 9, 2021Egypt, Italy and US most affected in Facebook leak
April 9, 2021NCSC: Using your pet’s name as a password is very stupid
April 9, 2021Cring ransomware hits ICS through two-year-old bug
Adware Spreads via Fake TikTok App, Laptop Offers
April 8, 2021Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers
April 8, 2021IcedID Banking Trojan Surges: The New Emotet?
April 8, 2021Azure Functions Weakness Allows Privilege Escalation
Nation-state cyber attacks double in three years
April 8, 2021Facebook ducks calls to apologise over huge data leak
Attackers Blowing Up Discord, Slack with Malware
April 7, 2021Facebook data leak could be outside scope of GDPR
April 6, 2021Ultimate guide to cybersecurity incident response
How to build a honeypot to increase network security
March 31, 2021NHS is apparently closing security skills gap
March 31, 2021Cyber Security Council to champion UK security pros
Create an incident response plan with this free template
March 30, 2021Ransomware attack on London schools highlights warnings
March 30, 2021The Security Interviews: How to secure an F1 team in a pandemic
How to fix the top 5 cybersecurity vulnerabilities
March 25, 2021How to fix the top 5 cybersecurity vulnerabilities
March 25, 2021Top 10 types of information security threats for IT teams
SolarWinds hack explained: Everything you need to know
February 9, 2021Azure AD Premium P1 vs. P2: Which is right for you?
December 22, 2020Certified Information Systems Auditor (CISA)
November 21, 2020Cybersecurity communication key to addressing risk
November 4, 2020Red team vs. blue team vs. purple team: What's the difference?
November 4, 20203 steps to secure codebase updates, prevent vulnerabilities
Site-to-site VPN security benefits and potential risks
August 28, 2020vulnerability assessment (vulnerability analysis)
July 24, 2020Remote backup and recovery, protection changes that will stick
integrated risk management (IRM)
May 20, 2020Use and protect backup against COVID-19-related cybercrime
Create a mobile BYOD policy for the coronavirus pandemic
April 8, 2020managed detection and response (MDR)
April 3, 2020How zero-trust authentication and architecture have evolved
March 25, 20204 factors that should shape a BYOD mobile policy
Zoom vulnerability reveals privacy issues for users
July 12, 2019What's the best way to mitigate the risk of GPU malware?
December 7, 2015Millions left at risk as Android Stagefright fix pushed to September
Web monitoring software helps keep employees honest
July 7, 2015After Windows Server 2003 end of life: An emergency action plan
IRS breach shows the importance of PII security
May 29, 2015Comparing the top SSL VPN products
Insider threat programs need people, not technology
April 28, 2015Surviving cyberwar: Preparing for APTs, Stuxnet malware-style attacks
Microsoft Exchange Servers Zero-Day Vulnerability
March 8, 2021Advisory on Windows Vulnerabilities
February 25, 2021Update Advisory for APT Attacks on the SolarWinds Products
January 4, 2021APT Compromise of Orion Platforms
January 1, 2021Security Advisory on Phishing Attacks
December 15, 2020Advisory on Intended Nationwide Cyber attack
October 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020New EvilQuest Ransomware for macOS Systems
July 1, 2020SaltStack FrameWork Vulnerabilities in Cisco Products
June 19, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Multiple Security Vulnerabilities on D-LINK Home Routers
June 17, 2020ngCERT Advisory on Scranos Malware
February 10, 2020ngCERT VMware Tools vulnerability
January 16, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"