Windows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Crest and IASME to deliver upcoming NCSC Cyber Exercise programme
Cover-ups still the norm in the wake of a cyber incident
September 26, 2023Apple fixes three vulnerabilities found by spyware researchers
September 25, 2023Security Think Tank: Three ways to identify the best encryption use cases
September 25, 2023Fear is the mind-killer: Governance key to safety in the cyber dunes
Cyber experts set out plan to secure crucial 2024 US election
September 22, 2023UK-US data bridge to open to traffic on 12 October
September 22, 2023Annual Security Serious Awards nominations announced
September 22, 2023governance, risk and compliance (GRC)
Poor digital experience a blocker for cyber resilience
September 21, 2023‘Top’ ransomware gangs favour smaller businesses
September 21, 2023Multi-agency pilot aims to help innovators navigate regulatory landscape
September 20, 2023Organisations failing to proactively address insider cyber risk
Nominet and European counterparts link up on intelligence sharing
September 19, 202338TB Microsoft data leak highlights risks of oversharing
Okta confirms link to cyber attacks on Las Vegas casinos
September 19, 2023New revelations from the Snowden archive surface
September 19, 2023Braverman puts pressure on Meta to pause end-to-end encryption plans
September 19, 2023ransomware as a service (RaaS)
SolarWinds hack explained: Everything you need to know
June 27, 2023Use IoT hardening to secure vulnerable connected devices
June 16, 2023Certified Cloud Security Professional (CCSP)
May 9, 2023DC Health Link breach caused by misconfigured server
April 20, 2023How to defend against TCP port 445 and other SMB exploits
April 19, 202311 cybersecurity tips for business travelers
Top 10 types of information security threats for IT teams
February 7, 2023How to fix the top 5 cybersecurity vulnerabilities
How to fix the top 5 cybersecurity vulnerabilities
February 6, 2023What to keep in mind when securing virtual environments
February 6, 20238 cybersecurity books to read in 2023
October 28, 2022Student Loan Breach Exposes 2.5M Records
August 31, 2022Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
August 29, 2022Ransomware Attacks are on the Rise
August 26, 2022Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
August 23, 2022Fake Reservation Links Prey on Weary Travelers
August 22, 2022iPhone Users Urged to Update to Patch 2 Zero-Days
August 19, 2022Google Patches Chrome’s Fifth Zero-Day of the Year
3 ways to help cybersecurity pros avoid burnout
July 26, 2022What are the pros and cons of electronic signatures?
July 22, 2022software bill of materials (SBOM)
July 12, 2022Do you meet all the modern authentication requirements?
Learn to work with the Office 365 unified audit log
May 23, 2022How to train agents on call center fraud detection
December 9, 2021Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
Comparing the top SSL VPN products
April 28, 2015Multiple Critical Vulnerabilities Reported in CODESYS V3 SDK
August 16, 2023New Method of Deploying Malware on Google Play Store
August 10, 2023Advisory On Preventing Web Application Access Control Abuse
August 1, 2023Windows 10 Task Scheduler Zero-Day Vulnerability
July 21, 2023Windows BlueKeep Vulnerability
July 21, 2023An Act to provide a legal framework for the protection of personal information, and ...
The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
Top Safe web surfing tips for kids
2 months ago"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"