A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
  • PHOBOS RANSOMWARE ATTACK

    TZ-CERT has observed a new and sophisticated techniques that ransomware actors are currently using to infect targeted victims across the globe. The ransomware actors have launched a new variant of ran…

  • Ransomware

    RANSOMWARE OUTBREAK

    Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Principally, it encrypts files on the compromised systems and deman…

  • Fileless

    FILELESS MALWARE ATTACK

    Tanzania Computer Emergency Response Team (TZ-CERT) is aware of security incidents involving malicious software named “Fileless malware”. As its name implies, it doesn’t depend on a computer file as a…

  • DOMAIN NAMING SYSTEM (DNS) HIJACKING NOTICE

    Tanzania Computer Emergency Team (TZ-CERT) is informed of a large scale and global campaign involving DNS Infrastructure hijacking targeting domains belonging to Government, Internet Service Providers…

Current Activities

Security Updates for Adobe Flash Player

Adobe has released security updates for Flash Player. These updates address critical vulnerability that could potentially allow an attacker to take control of the affected system. Affected software versions are:- .Adobe Flash Player 16.0.0.296 and earlier versions .Adobe Flash Player 13.0.0.264 and earlier 13.x versions .Adobe Flash Player 11.2.202.440 and …

Read More »

Security Update for Google Chrome

Google has released Chrome 40.0.2214.111 for Windows, Mac and Linux. This update addresses multiple vulnerabilities (e.g. Use-after-free in DOM [CVE-2015-1209], Cross-origin-bypass in V8 bindings [CVE-2015-1210], Privilege escalation using service workers [CVE-2015-1211]) that could allow an attacker to cause a denial of service condition or obtain personal information. Users and administrators …

Read More »

Linux ‘Ghost’ Remote Code Execution Vulnerability

Linux GNU C Library versions prior to 2.18 are vulnerable. The vulnerability may allow an attacker to remotely take control of an affected system. Users and administrators are recommended to refer to their respective Linux or Unix-based OS vendor(s) and update their system. Patches are available from Ubuntu and Red …

Read More »

Apple Releases Security Updates for OS X, Safari, iOS and Apple TV

Apple has released a security updates for OS X, Safari, iOS and Apple TV to address multiple vulnerabilities. Exploitation of these vulnerabilities may allow remote attackers to take control of a vulnerable system. The following updates are available:- OS X v10.10.2 and Security Update 2015-001 for OS X Mountain Lion …

Read More »

Adobe Released Security Update for Flash Player

Adobe has released security update for Flash Player;   Adobe Flash Player 16.0.0.296 for Windows and Macintosh. The update addresses critical vulnerability that has been identified that could potentially allow an attacker to take control of the affected system. Users and administrators are encouraged to review and apply the necessary …

Read More »

Subscribe to Receive Regular Updates

sub2.fw

A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe