Windows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Cisco joins growing Manchester cyber security hub
Security Think Tank: Why “secure coding” is neither
May 26, 2023How to conduct a smart contract audit and why it's needed
Kuwait bank introduces biometric payments card
May 24, 2023Cohesity Turing aims AI tools at backup and ransomware
Executive interview: DNS designer David Holtzman discusses net security
NetApp to promise ransomware warranty payout
May 16, 2023MS macro-blocking has forced cyber criminals to innovate
IT Priorities 2023: Budgeting for IT innovation
Certified Cloud Security Professional (CCSP)
May 9, 2023DC Health Link breach caused by misconfigured server
April 20, 2023How to defend against TCP port 445 and other SMB exploits
11 cybersecurity tips for business travelers
April 17, 2023Top 10 types of information security threats for IT teams
February 7, 2023What to keep in mind when securing virtual environments
February 6, 2023How to fix the top 5 cybersecurity vulnerabilities
February 6, 2023How to fix the top 5 cybersecurity vulnerabilities
February 6, 20238 cybersecurity books to read in 2023
October 28, 2022Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
August 30, 2022Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
August 29, 2022Ransomware Attacks are on the Rise
August 26, 2022Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
August 24, 2022Firewall Bug Under Active Attack Triggers CISA Warning
August 23, 2022Fake Reservation Links Prey on Weary Travelers
August 22, 2022iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
August 18, 20223 ways to help cybersecurity pros avoid burnout
July 26, 2022What are the pros and cons of electronic signatures?
July 22, 2022software bill of materials (SBOM)
SolarWinds hack explained: Everything you need to know
June 29, 2022Do you meet all the modern authentication requirements?
June 28, 2022Learn to work with the Office 365 unified audit log
May 23, 2022Query event logs with PowerShell to find malicious activity
How to train agents on call center fraud detection
December 9, 2021Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
Comparing the top SSL VPN products
April 28, 2015Dangerous Android Malware Infiltrates Google Play Store Apps
April 19, 2023Cybercriminals Using YouTube to Spread Malware
March 23, 2023Increasing Watering Hole Attacks in Nigeria
March 16, 2023Phishing Emails with OneNote Attachments Used to Disseminate RATs
January 24, 2023Increasing Cases of Wiperware Infection
January 19, 2023Security Advisory on Most Commonly Used Passwords in Nigeria
December 9, 2022TikTok Challenge Used To Circulate Information-Stealing Malware
December 1, 2022Malware-laden Apps Discovered on Google Play Store
November 4, 2022Unofficial WhatsApp Android app Stealing User’s Accounts
October 28, 2022Increased Cases of Accounts Takeover in Nigeria
October 11, 2022Multiple Vendor Vulnerabilities Reported on Lenovo Products
September 22, 2022Multiple Vulnerabilities Reported in Zoom
September 21, 2022Beware of Malicious Web Browser Extensions
September 13, 2022WordPress Websites Compromised With Fake DDoS Protection Page
August 23, 2022Cisco Networks hacked by Yanluowang Ransomware Group
August 12, 2022New HiddenAds Malware on Google Play Store Uncovered
August 8, 2022Microsoft announced End-of-Support for Windows 8.1
July 22, 2022Dangerous Malware Targets Android Devices
June 2, 2022Novel Use of Chatbots in Phishing Schemes
May 23, 2022New Browser-In-The Browser (BITB) Phishing Attacks
March 29, 2022New Variant of BRATA Banking Trojan Infecting Android Devices
January 28, 2022Wordpress Themes and Plugins Vulnerabilities
January 25, 2022SMS-Based Malware Infecting Mobile Devices
January 20, 2022Apache Log4j Remote Code Execution Vulnerability.
December 20, 2021New Windows Installer Zero-Day Vulnerability
November 25, 2021Google Warn Users of Government-Sponsored Attacks
October 16, 2021Facebook, Instagram and WhatsApp global outage
October 4, 2021Browser’s DNS Rebinding Attacks
September 22, 2021Fortinet Leaked VPN Account Credentials
September 10, 2021Russian GRU Global Brute Force Attacks
July 2, 2021Microsoft Edge Browser Vulnerabilities
July 1, 2021Cellebrite Forensic Software Security Vulnerabilities
April 28, 2021Microsoft Exchange Servers Zero-Day Vulnerability
March 8, 2021Advisory on Windows Vulnerabilities
February 25, 2021Update Advisory for APT Attacks on the SolarWinds Products
January 4, 2021APT Compromise of Orion Platforms
January 1, 2021Security Advisory on Phishing Attacks
December 15, 2020Advisory on Intended Nationwide Cyber attack
October 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020New EvilQuest Ransomware for macOS Systems
July 1, 2020SaltStack FrameWork Vulnerabilities in Cisco Products
June 19, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Multiple Security Vulnerabilities on D-LINK Home Routers
June 17, 2020ngCERT Advisory on Scranos Malware
February 10, 2020ngCERT VMware Tools vulnerability
January 16, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"