A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site

    TZ-CERT has observed a new and sophisticated techniques that ransomware actors are currently using to infect targeted victims across the globe. The ransomware actors have launched a new variant of ran…

  • Ransomware


    Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Principally, it encrypts files on the compromised systems and deman…

  • Fileless


    Tanzania Computer Emergency Response Team (TZ-CERT) is aware of security incidents involving malicious software named “Fileless malware”. As its name implies, it doesn’t depend on a computer file as a…


    Tanzania Computer Emergency Team (TZ-CERT) is informed of a large scale and global campaign involving DNS Infrastructure hijacking targeting domains belonging to Government, Internet Service Providers…

Current Activities

Security Updates for Adobe Flash Player

Adobe has released security updates for Flash Player for Windows, Macintosh and Linux. These updates address critical vulnerability that could potentially allow an attacker to take control of the affected system. Affected software versions are:- (a) Adobe Flash Player and earlier versions (b) Adobe Flash Player and earlier …

Read More »

Apple Releases Security Updates for OS X, iOS and Apple TV

Apple has released a security updates for OS X, iOS and Apple TV to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow an attacker to intercept HTTPS connections between vulnerable clients and servers (Kindly make reference of FREAK Attack) The following updates are available:- Xcode 6.2 for …

Read More »

Microsoft Security Bulletin Summary for March 2015

Microsoft has released a security bulletin summary for March 2015 to address vulnerabilities in Windows. Exploitation of these vulnerabilities could allow elevation of privilege, disclosure of information, remote code execution, spoofing or security feature bypass. Users and administrators are encouraged to review Microsoft Security Bulletin, MS15-Mar, and apply the necessary …

Read More »

FREAK SSL/TLS Vulnerability

FREAK (Factoring Attack on RSA-EXPORT Keys) SSL/TLS Vulnerability has been discovered, a weakness in some implementations of SSL/TLS.  It allows an attacker to intercept HTTPS connections between vulnerable clients and servers and force the two to use weakened encryption, which the attacker can break to steal or manipulate sensitive data. …

Read More »

Samba Vulnerability

Samba Vulnerability has been discovered in Linux and UNIX based operating systems. All versions of Samba from 3.5.0 to 4.2.0rc4 are vulnerable to an unexpected code execution in the smbd file server daemon. Updates have been released to address the vulnerability that could allow an attacker to take control of …

Read More »

Subscribe to Receive Regular Updates


A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe