Windows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
North Korean APTs go all in on supply chain attacks, warns NCSC
Navigating the DPDI Bill: A transformative shift ahead
November 23, 2023CISA reveals how LockBit hacked Boeing via Citrix Bleed
November 22, 2023Palantir awarded NHS FDP data contract
November 22, 2023An inside look at a Scattered Spider cyber attack
Why transparency and accountability are important in cyber security
November 21, 2023The ‘application generation’ demands more from developers
November 21, 2023Canada’s Mounties among government employees hit by LockBit
Over half of SME cyber incidents now ‘malware-free’
November 21, 2023How do cybercriminals steal credit card information?
November 21, 2023Security incident response teams are human, too
IT not ready for AI, Pure Storage survey finds
November 20, 2023Kingfisher develops AI-agnostic platform to power DIY assistant
November 20, 2023Microsoft and Meta quizzed on AI copyright
What is cyber hygiene and why is it important?
November 16, 2023Ransomware gang grasses up uncooperative victim to US regulator
November 16, 2023Royal Mail spent £10m on cyber measures after LockBit attack
November 16, 2023Automated Clearing House fraud (ACH fraud)
SolarWinds hack explained: Everything you need to know
November 3, 2023Top enterprise risk management certifications to consider
October 16, 2023ransomware as a service (RaaS)
July 7, 2023Use IoT hardening to secure vulnerable connected devices
Certified Cloud Security Professional (CCSP)
May 9, 2023DC Health Link breach caused by misconfigured server
How to defend against TCP port 445 and other SMB exploits
April 19, 202311 cybersecurity tips for business travelers
April 17, 2023Top 10 types of information security threats for IT teams
How to fix the top 5 cybersecurity vulnerabilities
February 6, 2023How to fix the top 5 cybersecurity vulnerabilities
February 6, 2023What to keep in mind when securing virtual environments
8 cybersecurity books to read in 2023
Student Loan Breach Exposes 2.5M Records
August 31, 2022Watering Hole Attacks Push ScanBox Keylogger
August 30, 2022Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
August 29, 2022Ransomware Attacks are on the Rise
Twitter Whistleblower Complaint: The TL;DR Version
August 24, 2022Firewall Bug Under Active Attack Triggers CISA Warning
August 23, 2022Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
August 19, 2022Google Patches Chrome’s Fifth Zero-Day of the Year
August 18, 20223 ways to help cybersecurity pros avoid burnout
July 26, 2022What are the pros and cons of electronic signatures?
software bill of materials (SBOM)
July 12, 2022How to train agents on call center fraud detection
December 9, 2021Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
Comparing the top SSL VPN products
April 28, 2015Security Alert For Google Chrome and Apple Users
November 21, 2023Cloud Storage Misconfiguration Threats
October 13, 2023Fake YouTube Android Apps Used to Spread Malware
September 29, 2023Multiple Critical Vulnerabilities Reported in CODESYS V3 SDK
August 16, 2023New Method of Deploying Malware on Google Play Store
August 10, 2023Advisory On Preventing Web Application Access Control Abuse
August 1, 2023ngCERT Advisory on Scranos Malware
July 21, 2023ESXi Remote Code Execution Vulnerability
July 21, 2023Windows 10 Task Scheduler Zero-Day Vulnerability
July 21, 2023Windows BlueKeep Vulnerability
July 21, 2023An Act to provide a legal framework for the protection of personal information, and ...
The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
Top Safe web surfing tips for kids
4 months ago"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"