No recent events yet!
The Nigeria Computer Emergency Response Team has the mission to achieve a safe, secure and resilient cyberspace in Nigeria that provides opportunities for national prosperity. ngCERT is
established to prepare, protect, and secure the Nigerian cyberspace in anticipation of
attacks, problems, or events. ngCERT is saddled with the responsibility of
reducing the volume of future incidents.
Incident Response Plan
What is the Incident?
Contain the Issue immediately
Determine the cause of the incident
Get Rid of the issue
Restore service as fast as possible
Many are called, but few are chosen: Secrets of MI5 watchers revealed
Preparing for AI regulation: The EU AI Act
January 13, 2025Can UK government achieve ambition to become AI powerhouse?
January 13, 2025CNI operators should ask these 12 questions of their OT suppliers
January 13, 2025Why we need better cyber regulation to protect the UK from disruption
UK government plans to extend ransomware payment ban
January 13, 2025Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks
January 10, 2025US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
January 10, 2025German court finds hacked EncroChat phone evidence inadmissible
Regional skills plan to boost UK cyber defences
January 7, 2025US Treasury incident a clear warning on supply chain security in 2025
What is the Gramm-Leach-Bliley Act (GLBA)?
January 3, 20256 must-read blockchain books for 2025
December 23, 2024What is a public key and how does it work?
The Data Bill: It’s time to cyber up
December 19, 2024Latest attempt to override UK’s outdated hacking law stalls
December 19, 2024LockBit ransomware gang teases February 2025 return
December 19, 2024What is managed detection and response (MDR)?
API security testing checklist: 7 key steps
November 1, 2024What is unified threat management (UTM)?
November 1, 20247 common intrusion detection system evasion techniques
Contact center fraud: How to detect and prevent it
October 4, 2024Benefits and challenges of electronic signatures
July 30, 2024The differences between open XDR vs. native XDR
July 25, 2024Top enterprise risk management certifications to consider
What is a cloud security framework? A complete guide
June 5, 2024What are the pros and cons of shadow IT?
March 5, 2024Top 10 types of information security threats for IT teams
January 29, 2024What is attack surface management and why is it necessary?
January 29, 2024What is cyber hygiene and why is it important?
November 16, 2023SolarWinds hack explained: Everything you need to know
ransomware as a service (RaaS)
July 7, 2023Use IoT hardening to secure vulnerable connected devices
June 16, 2023Certified Cloud Security Professional (CCSP)
DC Health Link breach caused by misconfigured server
April 20, 2023How to defend against TCP port 445 and other SMB exploits
April 19, 2023Student Loan Breach Exposes 2.5M Records
August 31, 2022Watering Hole Attacks Push ScanBox Keylogger
August 30, 2022Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
August 29, 2022Ransomware Attacks are on the Rise
Twitter Whistleblower Complaint: The TL;DR Version
August 24, 2022Firewall Bug Under Active Attack Triggers CISA Warning
August 23, 2022Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
August 19, 2022Google Patches Chrome’s Fifth Zero-Day of the Year
August 18, 2022Use and protect backup against COVID-19-related cybercrime
April 23, 2020Zoom vulnerability reveals privacy issues for users
Comparing the top SSL VPN products
April 28, 2015DIRECTORY TRAVERSAL VULNERABILITY
May 28, 2025INCREASED ANDROID.VO1D MALWARE INFECTIONS
March 7, 2025SPREAD OF NYMAIM MALWARE INFECTION
January 30, 2025TINYBANKER “TINBA” MALWARE INFILTRATION
January 30, 2025INCREASE IN PHISHING CAMPAIGNS WITHIN THE NIGERIAN CYBERSPACE
January 15, 2025VULNERABILITY IN VERSA DIRECTOR SERVERS
November 27, 2024RANSOMWARE GROUPS TARGETING CRITICAL SYSTEMS IN NIGERIA
September 13, 2024HIGH SEVERITY VULNERABILITIES IN IVANTI PRODUCTS
July 12, 2024ANATSA BANKING TROJAN TARGETING ANDROID DEVICES
July 10, 2024ESCALATION OF RANSOMWARE ATTACK IN NIGERIA
July 8, 2024Critical Wi-Fi Driver Vulnerability in Microsoft Windows
June 21, 2024Multiple Vulnerabilities Discovered In Oracle Products
April 24, 2024Vultur Banking Trojan Targeting Android Devices
April 16, 2024Urgent Security Update On Microsoft Systems
March 4, 2024Chameleon Android Banking Trojan Targeting Users Worldwide
February 1, 2024High-Severity Vulnerability Discovered in Zoom Products
January 29, 2024Cybercriminals Compromising Google Accounts Without their passwords.
January 11, 2024Advisory On Preventing Web Application Access Control Abuse
August 1, 2023ngCERT Advisory on Scranos Malware
July 21, 2023Windows 10 Task Scheduler Zero-Day Vulnerability
July 21, 2023Windows BlueKeep Vulnerability
July 21, 2023An Act to provide a legal framework for the protection of personal information, and ...
The Act provides an effective, unified and comprehensive legal, regulatory and institutional framework for...
Designation and Protection of Critical National Information Infrastructure Order, 2024
"Antiphishing.ng Project is a collaborative effort to create a community driven public repository about phishing that works to build additional tools to benefit the security community at large."
"tunCERT is the National CERT of the Tunisian government under the National Agency for Computer Security. tunCERT is one of the CERT that graciously partook in pioneering ngCERT"
"FIRST is a recognized global leader in incident response that brings together a variety of computer security incident response teams from government, commercial, and educational organizations."
"Team Cymru was formed in 1998 to learn the "who and why" of malicious Internet activity. This focus on attribution resulted in the uncovering of the "what, when, where, and how" of online malevolence"