Windows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Assange appeals against Priti Patel’s extradition order
Cyber insurance: What does a CISO need to know?
July 4, 2022ICO to cut back on fines for public sector data breaches
June 30, 2022SolarWinds hack explained: Everything you need to know
New cyber extortion op appears to have hit AMD
June 29, 2022Romance scammers exploit Ukraine war in cynical campaign
June 29, 2022SolarWinds hack explained: Everything you need to know
Top Six Security Bad Habits, and How to Break Them
June 28, 2022Mitel VoIP Bug Exploited in Ransomware Attacks
June 28, 2022Avast uncovers ‘thieves’ kitchen’ of malware-writing teens
Russia-aligned hacktivists behind Lithuania DDoS attack
June 28, 2022‘Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockade
Do you meet all the modern authentication requirements?
June 28, 2022Brexit a net negative for UK cyber, say CISOs
LockBit ransomware gang launches bug bounty programme
June 27, 2022Secure everything, not just the weakest link
June 27, 2022Black Basta ransomware crew aiming for ‘big leagues’
Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug
June 23, 2022Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture
Gamification of Ethical Hacking and Hacking Esports
June 22, 2022Elusive ToddyCat APT Targets Microsoft Exchange Servers
June 22, 2022Kazakh Govt. Used Spyware Against Protesters
June 21, 2022Learn to work with the Office 365 unified audit log
Windows Server 2022 security hardening guide for admins
10 cybersecurity tips for business travelers
April 22, 2022built-in administrator account
April 18, 2022Get started with Azure AD entitlement management automation
April 14, 2022Why is document version control important?
COPPA (Children's Online Privacy Protection Act )
March 21, 20225 cybersecurity myths and how to address them
March 16, 2022Network security gets a boost in Windows Server 2022
February 1, 2022What is cyber hygiene and why is it important?
Endpoint security is nothing without human operators
January 11, 20227 API security testing best practices, with checklist
January 4, 2022Everything you need to know about ProxyShell vulnerabilities
December 29, 20215 tips for primary storage ransomware protection
December 16, 2021How to train agents on call center fraud detection
December 9, 2021How to fix the top 5 cybersecurity vulnerabilities
March 25, 2021Top 10 types of information security threats for IT teams
Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
July 12, 2019Google changes Chrome extension policy amid security concerns
Comparing the top SSL VPN products
April 28, 2015Dangerous Malware Targets Android Devices
June 2, 2022Novel Use of Chatbots in Phishing Schemes
May 23, 2022New Browser-In-The Browser (BITB) Phishing Attacks
March 29, 2022New Variant of BRATA Banking Trojan Infecting Android Devices
January 28, 2022Wordpress Themes and Plugins Vulnerabilities
January 25, 2022SMS-Based Malware Infecting Mobile Devices
January 20, 2022Apache Log4j Remote Code Execution Vulnerability.
December 20, 2021New Windows Installer Zero-Day Vulnerability
November 25, 2021Google Warn Users of Government-Sponsored Attacks
October 16, 2021Facebook, Instagram and WhatsApp global outage
October 4, 2021Browser’s DNS Rebinding Attacks
September 22, 2021Fortinet Leaked VPN Account Credentials
September 10, 2021Russian GRU Global Brute Force Attacks
July 2, 2021Microsoft Edge Browser Vulnerabilities
July 1, 2021Cellebrite Forensic Software Security Vulnerabilities
April 28, 2021Microsoft Exchange Servers Zero-Day Vulnerability
March 8, 2021Advisory on Windows Vulnerabilities
February 25, 2021Update Advisory for APT Attacks on the SolarWinds Products
January 4, 2021APT Compromise of Orion Platforms
January 1, 2021Security Advisory on Phishing Attacks
December 15, 2020Advisory on Intended Nationwide Cyber attack
October 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020New EvilQuest Ransomware for macOS Systems
July 1, 2020SaltStack FrameWork Vulnerabilities in Cisco Products
June 19, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Multiple Security Vulnerabilities on D-LINK Home Routers
June 17, 2020ngCERT Advisory on Scranos Malware
February 10, 2020ngCERT VMware Tools vulnerability
January 16, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"