ngCERT Malware Security Tip On Malicious Code
11 months agoThe Revised Draft Data Protection Bill 2020
4 months agoWindows BlueKeep Vulnerability
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Hackers Amp Up COVID-19 IP Theft Attacks
Ransomware in 2020: A Banner Year for Extortion
December 28, 2020Windows Zero-Day Still Circulating After Faulty Fix
December 24, 2020Top 10 Middle East stories of 2020
December 24, 2020Top 10 Downtime Upload podcasts of 2020
Security Long Reads: Cyber insiders reveal what’s to come in 2021
December 24, 2020Top 10 cyber crime stories of 2020
December 24, 2020How to manage non-human identities
December 24, 2020Lazarus Group Hits COVID-19 Vaccine-Maker in Espionage Attack
It’s time to accept that disinformation is a cyber security issue
December 23, 2020Endpoint security quiz: Test your knowledge
December 23, 2020Top 10 cyber security stories of 2020
December 23, 2020Patching: Balancing technical requirements with business considerations
Emotet Returns to Hit 100K Mailboxes Per Day
December 23, 2020Hey Alexa, Who Am I Messaging?
December 23, 2020Third-Party APIs: How to Prevent Enumeration Attacks
December 23, 2020Tech Giants Lend WhatsApp Support in Spyware Case Against NSO Group
Azure AD Premium P1 vs. P2: Which is right for you?
December 22, 2020Joker’s Stash Carding Site Taken Down
December 22, 2020Ministry of Justice in the dock for catalogue of serious data breaches
December 22, 2020Holiday Puppy Swindle Has Consumers Howling
Utility supplier People’s Energy has entire customer list stolen
December 18, 2020SolarWinds cyber attack is ‘grave risk’ to global security
December 18, 2020Finnish government tables laws to protect data from cyber criminals
December 18, 2020Dodgy browser extensions put social media users at risk
NHS Scotland taps Check Point to secure Covid-19 data
December 17, 2020FireEye and partners release SolarWinds kill-switch
December 17, 2020EU security strategy a ‘step up’ on cyber leadership, says Brussels
December 17, 2020SolarWinds cyber attack: How worried should I be, and what do I do now?
Cyber crime victims in the Netherlands not reporting offences
December 15, 2020Certified Information Systems Auditor (CISA)
Cybersecurity communication key to addressing risk
November 4, 2020Red team vs. blue team vs. purple team: What's the difference?
November 4, 20203 steps to secure codebase updates, prevent vulnerabilities
September 15, 2020Site-to-site VPN security benefits and potential risks
vulnerability assessment (vulnerability analysis)
July 24, 2020Identifying and troubleshooting VPN session timeout issues
integrated risk management (IRM)
May 20, 2020Use and protect backup against COVID-19-related cybercrime
April 23, 2020Create a mobile BYOD policy for the coronavirus pandemic
What is cybersecurity? Everything you need to know
April 3, 2020managed detection and response (MDR)
April 3, 2020How zero-trust authentication and architecture have evolved
March 25, 20204 factors that should shape a BYOD mobile policy
Lack of U.S. cryptocurrency regulation invites risk
August 19, 2019Zoom vulnerability reveals privacy issues for users
How to fix the top 5 cybersecurity vulnerabilities
June 28, 2019What's the best way to mitigate the risk of GPU malware?
December 7, 2015Millions left at risk as Android Stagefright fix pushed to September
Web monitoring software helps keep employees honest
July 7, 2015From the frontlines: Horror stories on information breach response
IRS breach shows the importance of PII security
May 29, 2015Google changes Chrome extension policy amid security concerns
Comparing the top SSL VPN products
April 28, 2015Insider threat programs need people, not technology
April 28, 2015Web browser protection for users: Adapting to new Web security threats
APT Compromise of Orion Platforms
January 1, 2021Security Advisory on Phishing Attacks
December 15, 2020ReVoLTE Networks Vulnerability
August 27, 2020RV Series Routers Command Injection Vulnerabilities
August 5, 2020Cisco Small Business Routers Vulnerabilities
July 17, 2020New EvilQuest Ransomware for macOS Systems
July 1, 2020Webex Desktop App Vulnerability
June 24, 2020Multiple Security Vulnerabilities for Adobe Products
June 18, 2020Multiple Security Vulnerabilities on D-LINK Home Routers
June 17, 2020Local Privilege Escalation Vulnerability for VMware
June 16, 2020Windows BlueKeep Vulnerability
February 10, 2020ESXi Remote Code Execution Vulnerability
February 10, 2020Considering the national doctrines and principles on security, and the inter-connected nature of ICT...
The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
Top Safe web surfing tips for kids
11 months ago"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"