The Revised Draft Data Protection Bill 2020
6 months agoWindows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Amazon Dismisses Claims Alexa ‘Skills’ Can Bypass Security Vetting Process
Cyber extortionist threatened to bomb NHS targets
February 26, 2021On digital identity, the government gets it wrong again
February 26, 2021Protecting Sensitive Cardholder Data in Today’s Hyper-Connected World
February 26, 2021Podcast: Ransomware Attacks Exploded in Q4 2020
Stalkerware Volumes Remain Concerningly High, Despite Bans
February 26, 2021Malware Gangs Partner Up in Double-Punch Security Threat
February 26, 2021Yeezy Fans Face Sneaker-Bot Armies for Boost ‘Sun’ Release
February 26, 2021Lazarus Targets Defense Companies with ThreatNeedle Malware
Cyberattacks Launch Against Vietnamese Human-Rights Activists
February 25, 2021MHRA and other agencies to offer new resources for scam victims
February 25, 2021Atos and HDF Energy to build ‘green hydrogen-powered’ datacentre by 2023
February 25, 2021Npower shuts off app after credential stuffing attack
GCHQ sets out rules of the road for AI in cyber
February 25, 2021Get started with network penetration testing for beginners
February 25, 2021NCSC Cyber Action Plan emphasises SME security
Advice on how to learn network penetration testing skills
February 25, 2021Malicious Mozilla Firefox Extension Allows Gmail Takeover
February 25, 2021Health Website Leaks 8 Million COVID-19 Test Results
February 25, 2021Bombardier is latest victim of Accellion supply chain attack
Babuk ransomware unsophisticated, but highly dangerous
February 24, 2021Warning on security risk from virtual events platforms
February 24, 2021Vaccine passports prove an ethical minefield
February 24, 2021Guide to cloud security management and best practices
Is Clubhouse safe, and should CISOs stop its use?
February 24, 2021Rogue drones beware: We’re here to ground you
February 23, 2021How to achieve security observability in complex environments
February 23, 2021XDR makes cyber a Stroll in the park for Aston Martin F1
AI powers reputational damage insurance policy
February 23, 2021SolarWinds hack explained: Everything you need to know
February 9, 2021Azure AD Premium P1 vs. P2: Which is right for you?
Certified Information Systems Auditor (CISA)
November 21, 2020Red team vs. blue team vs. purple team: What's the difference?
November 4, 2020Cybersecurity communication key to addressing risk
3 steps to secure codebase updates, prevent vulnerabilities
September 15, 2020Site-to-site VPN security benefits and potential risks
August 28, 2020vulnerability assessment (vulnerability analysis)
integrated risk management (IRM)
Use and protect backup against COVID-19-related cybercrime
April 23, 2020Create a mobile BYOD policy for the coronavirus pandemic
April 8, 2020managed detection and response (MDR)
April 3, 2020How zero-trust authentication and architecture have evolved
4 factors that should shape a BYOD mobile policy
January 3, 2020Lack of U.S. cryptocurrency regulation invites risk
August 19, 2019Zoom vulnerability reveals privacy issues for users
How to fix the top 5 cybersecurity vulnerabilities
June 28, 2019What's the best way to mitigate the risk of GPU malware?
December 7, 2015Millions left at risk as Android Stagefright fix pushed to September
Web monitoring software helps keep employees honest
July 7, 2015From the frontlines: Horror stories on information breach response
IRS breach shows the importance of PII security
May 29, 2015Google changes Chrome extension policy amid security concerns
Comparing the top SSL VPN products
April 28, 2015Insider threat programs need people, not technology
April 28, 2015Web browser protection for users: Adapting to new Web security threats
Security Advisory on Apple Chips Malware
February 23, 2021Update Advisory for APT Attacks on the SolarWinds Products
January 4, 2021APT Compromise of Orion Platforms
January 1, 2021Advisory on Intended Nationwide Cyber attack
October 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020RV Series Routers Command Injection Vulnerabilities
August 5, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020Webex Desktop App Vulnerability
June 24, 2020SaltStack FrameWork Vulnerabilities in Cisco Products
June 19, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Local Privilege Escalation Vulnerability for VMware
June 16, 2020ngCERT Advisory on Scranos Malware
February 10, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"