Incident Reporting

Incident Response

Incidents, Phishing, Malware, or Vulnerabilities


Current Activities

CERT-GH Information Sharing Workshop

» Read more

ITU trains Ghana’s Computer Emergency Response Team

A Two-week training programme to sharpen the skills of Ghana’s Computer Emergency Response Team (CERT) in Accra has begun at the Microsoft Laboratory of the Ghana Multimedia Incubation Centre (GMIC) under the auspices of the Ministry of

» Read more

Cisco releases security updates for Cisco Unified Communications Domain Manager

Cisco has released a security updates to address multiple vulnerabilities in Cisco Unified Communications Domain Manager (Cisco Unified CDM). These updates address vulnerabilities that may allow an attacker to execute commands or obtain

» Read more

Subscribe to Receive Regular Updates

A digest of Ghana Computer Incident Response Teams coverage of cybersecurity news across the globe

Malicious websites exploit Silverlight bug that can pwn Macs and Windows

Malicious websites are exploiting a recently fixed vulnerability in Microsoft’s Silverlight application framework to perform drive-by malware attacks on vulnerable visitor devices, a security researcher has determined.The critical code-execution vulnerability, which Microsoft patched last month, was actively exploited for two years in attack code owned by Italy-based exploit broker Hacking Team. As Ars reported last […]

Meet Lizard Squad

The hacker group known as the Lizard Squad has taken responsibility for a series of attacks that has taken down social networking sites;facebook,instagram and some of the biggest gaming networks. The group’s preferred method of disruption is a distributed denial-of-service (DDoS) attack. A DDoS attack is a coordinated effort that involves thousands of computers that […]

Microsoft Office Hacked: Windows Found ‘Limited, Targeted Attacks’ Within PowerPoint

Microsoft has advised users that a new security flaw has been discovered within Microsoft Office that makes it possible for hackers to gain administrative rights to user accounts. The company said the flaw is primarily found in PowerPoint, which has been the target of “limited, targeted attacks.” The hack hasn’t yet been given a label […]

The SSL 3.0 Vulnerability – POODLE Bug (AKA POODLEbleed)

On October 14, 2014, a vulnerability was publicly announced in the Secure Sockets Layer version 3 (SSLv3) protocol when using a block cipher in Cipher Block Chaining (CBC) mode. SSLv3 is a cryptographic protocol designed to provide communication security, which has been superseded by Transport Layer Security (TLS) protocols. By exploiting this vulnerability, an attacker […]

Meet ShellShock: A New Security Threat For Linux, Unix and Mac systems

A serious security issue with the Bash shell – a major component of both most UNIX-like operating systems – has been discovered, with significant implications for computer security worldwide. The issue is present in all versions of the Bash scripting language up to version 4.3, which effects a majority of Linux machines, and the entirety […]

Games and Malware

The gaming industry keeps growing in terms of popularity, and the large population of gamers, and the crowds at Cologne’s Gamescom 2014, represents an opportunity for miscreants to make money. In this blog post, we will explore various attacks specifically tailored to gamers, by starting with trojanized legitimate games, then by exploring some malicious software […]