Windows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Critical Flaws in Popular ICS Platform Can Trigger RCE
Consistency is key to mitigate outsourcing risk
May 27, 2022Most CFOs being left out of ransomware conversations
May 26, 2022Consultation launched on datacentre, cloud security
May 26, 2022Two-thirds of UK organisations defrauded since start of pandemic
Zoom Patches ‘Zero-Click’ RCE Bug
New inquiry looks at the state of UK chips
May 25, 2022Fronton IOT Botnet Packs Disinformation Punch
May 24, 2022Ransomware volumes grew faster than ever in 2021
May 24, 2022Snake Keylogger Spreads Through Malicious PDFs
May 23, 2022business impact analysis (BIA)
Learn to work with the Office 365 unified audit log
May 23, 2022380K Kubernetes API Servers Exposed to Public Internet
Former Welsh steelworks becomes ‘living’ cyber lab
May 20, 2022Chinese cyber spooks exploit western sanctions on Russia
business continuity plan (BCP)
May 19, 2022Top cyber criminal earnings outpace those of business leaders
Microsoft modern authentication deadline looms over Exchange
Windows Server 2022 security hardening guide for admins
April 26, 202210 cybersecurity tips for business travelers
April 22, 2022built-in administrator account
Get started with Azure AD entitlement management automation
April 14, 2022Why is document version control important?
March 29, 2022COPPA (Children's Online Privacy Protection Act )
March 21, 20225 cybersecurity myths and how to address them
Network security gets a boost in Windows Server 2022
February 1, 2022What is cyber hygiene and why is it important?
January 24, 2022Endpoint security is nothing without human operators
January 11, 20227 API security testing best practices, with checklist
Everything you need to know about ProxyShell vulnerabilities
December 29, 20215 tips for primary storage ransomware protection
December 16, 2021The Bigger Truth: Cybersecurity splurge and who needs 5G?
How to train agents on call center fraud detection
December 9, 2021ProxyShell vs. ProxyLogon: What's the difference?
November 29, 2021How to fix the top 5 cybersecurity vulnerabilities
March 25, 2021Top 10 types of information security threats for IT teams
Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
July 12, 2019Fobber: Drive-by financial malware returns with new tricks
Comparing the top SSL VPN products
April 28, 2015New Browser-In-The Browser (BITB) Phishing Attacks
March 29, 2022New Zero-Day Chrome Web Browser Vulnerability
February 15, 2022New Variant of BRATA Banking Trojan Infecting Android Devices
January 28, 2022Wordpress Themes and Plugins Vulnerabilities
January 25, 2022Apache Log4j Remote Code Execution Vulnerability.
December 20, 2021New Windows Installer Zero-Day Vulnerability
November 25, 2021Facebook, Instagram and WhatsApp global outage
October 4, 2021Browser’s DNS Rebinding Attacks
September 22, 2021Apple Zero-Day Vulnerabilities
May 18, 2021Cellebrite Forensic Software Security Vulnerabilities
April 28, 2021Fake LinkedIn Job Offer Malware
April 12, 2021Microsoft Exchange Servers Zero-Day Vulnerability
March 8, 2021Security Advisory on Apple Chips Malware
February 23, 2021Update Advisory for APT Attacks on the SolarWinds Products
January 4, 2021APT Compromise of Orion Platforms
January 1, 2021Advisory on Intended Nationwide Cyber attack
October 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020RV Series Routers Command Injection Vulnerabilities
August 5, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020Webex Desktop App Vulnerability
June 24, 2020SaltStack FrameWork Vulnerabilities in Cisco Products
June 19, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Local Privilege Escalation Vulnerability for VMware
June 16, 2020ngCERT Advisory on Scranos Malware
February 10, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"