Windows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Closing the Gap Between Application Security and Observability
Former Welsh steelworks becomes ‘living’ cyber lab
May 20, 2022380K Kubernetes API Servers Exposed to Public Internet
Nature of cyber war evolving in real time, says Microsoft president
business continuity plan (BCP)
May 19, 2022APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days
DOJ Says Doctor is Malware Mastermind
May 18, 2022Portworx adds anti-ransomware to PX-Backup for Kubernetes
Sysrv-K Botnet Targets Windows, Linux
May 17, 2022(ISC)² to train 100,000 cyber pros in UK
May 17, 2022iPhones Vulnerable to Attack Even When Turned Off
Open source community sets out path to secure software
Nerbian RAT enjoys using Covid-19 phishing lures
May 11, 2022CyberUK 22: Five Eyes focuses on MSP security
Windows Server 2022 security hardening guide for admins
10 cybersecurity tips for business travelers
April 22, 2022built-in administrator account
April 18, 2022Get started with Azure AD entitlement management automation
Why is document version control important?
March 29, 2022COPPA (Children's Online Privacy Protection Act )
March 21, 20225 cybersecurity myths and how to address them
March 16, 2022Network security gets a boost in Windows Server 2022
What is cyber hygiene and why is it important?
January 24, 2022Endpoint security is nothing without human operators
January 11, 20227 API security testing best practices, with checklist
January 4, 2022Everything you need to know about ProxyShell vulnerabilities
5 tips for primary storage ransomware protection
December 16, 2021The Bigger Truth: Cybersecurity splurge and who needs 5G?
December 10, 2021How to train agents on call center fraud detection
ProxyShell vs. ProxyLogon: What's the difference?
November 29, 2021How to fix the top 5 cybersecurity vulnerabilities
March 25, 2021Top 10 types of information security threats for IT teams
Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
July 12, 2019Fobber: Drive-by financial malware returns with new tricks
Comparing the top SSL VPN products
April 28, 2015New Browser-In-The Browser (BITB) Phishing Attacks
March 29, 2022New Variant of BRATA Banking Trojan Infecting Android Devices
January 28, 2022Wordpress Themes and Plugins Vulnerabilities
January 25, 2022SMS-Based Malware Infecting Mobile Devices
January 20, 2022Apache Log4j Remote Code Execution Vulnerability.
December 20, 2021New Windows Installer Zero-Day Vulnerability
November 25, 2021Google Warn Users of Government-Sponsored Attacks
October 16, 2021Facebook, Instagram and WhatsApp global outage
October 4, 2021Browser’s DNS Rebinding Attacks
September 22, 2021Fortinet Leaked VPN Account Credentials
September 10, 2021Russian GRU Global Brute Force Attacks
July 2, 2021Microsoft Edge Browser Vulnerabilities
July 1, 2021Cellebrite Forensic Software Security Vulnerabilities
April 28, 2021Microsoft Exchange Servers Zero-Day Vulnerability
March 8, 2021Advisory on Windows Vulnerabilities
February 25, 2021Update Advisory for APT Attacks on the SolarWinds Products
January 4, 2021APT Compromise of Orion Platforms
January 1, 2021Security Advisory on Phishing Attacks
December 15, 2020Advisory on Intended Nationwide Cyber attack
October 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020New EvilQuest Ransomware for macOS Systems
July 1, 2020SaltStack FrameWork Vulnerabilities in Cisco Products
June 19, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Multiple Security Vulnerabilities on D-LINK Home Routers
June 17, 2020ngCERT Advisory on Scranos Malware
February 10, 2020ngCERT VMware Tools vulnerability
January 16, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"