Official website of NIC-CERT(Computer Emergency Response Team)

National Informatics Centre - Computer Emergency Response Team (NIC-CERT)

NIC-CERT Division, is the nodal arm of NIC for managing the cyber security incidents in NIC. NIC-CERT shall also issue periodic threat intelligence, Security Alerts/tips and advisories to safe guard NIC's assets against cyber threats.

National Informatics Centre - Computer Emergency Response Team (NIC-CERT) division is constituted with an objective of analyzing, monitoring and responding to cyber threats on critical government cyber infrastructure like websites, emails and various services. NIC-CERT coordinates with other stake-holders to mitigate the cyber threats by monitoring network for security incidents and issuing advisory for vulnerabilities.

Cyber Security News

TorMoil Vulnerability Leaks Real IP Address from Tor Browser Users.

The Tor Project has released a security update for the Tor Browser on Mac and Linux to fix a vulnerability that leaks users' real IP addresses.

Poisoning the Well: Banking Trojan Targets Google Search Results

It has become common for users to use Google to find information that they do not know. In a quick Google search you can find practically anything you need to know.

Night of the Devil: Ransomware or wiper A look into targeted attacks in Japan using MBR-ONI

For several months Cybereason has been following the concerning rise of ONI, a family of ransomware involved in targeted attacks against Japanese companies.

Silence a new Trojan attacking financial organizations

In September 2017, we discovered a new targeted attack on financial institutions. Victims are mostly Russian banks but we also found infected organizations in Malaysia and Armenia.

Apple Patches KRACK Vulnerability in iOS 11.1

Apple has patched iOS, macOS and other products to protect against the KRACK vulnerability recently disclosed in the WPA2 Wi-Fi security protocol.

Artificial Intelligence System solves Captcha

Researchers have created an artificial intelligence system that can solve Captcha challenges, rendering them 'broken' and 'ineffective'.

Malicious Google Chrome Extension Steals all Posted data

It seems that malicious Google Chrome extensions are on the rise. A couple of months ago, I posted here about two of them [1][2] which stole user credentials posted on banking websites and alike


One day after clear ties were established between the Bad Rabbit ransomware attacks and this summer's NotPetya outbreak, researchers at Cisco today strengthened that bond disclosing that the leaked NSA exploit EternalRomance was used to spread the malware on compromised networks.

A Huge Wave of IoT Zombies Is Coming

Evolution is an integral part when it comes to malware, as attackers need to be one step ahead of whitehats to evade detection.

Magniber Ransomware Wants to Infect Only the Right People

Exploit kit (EK) use has been on the decline since late 2016; however, certain activity remains consistent. The Magnitude Exploit Kit is one such example that continues to affect users, particularly in the APAC region.

Report Incident


Recent Advisories

Advisory on Vulnerabilities in Cisco Multiple Products.

Cisco has released several updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

Advisory on Microsoft Windows Host Compute Service Shim Security Update.

A remote code execution vulnerability exists when the Windows Host Compute Service Shim (hcsshim) library fails to properly validate input while importing a container image.

Security Tip: Keep your software patches up-to-date and use supported versions of software

NIC-CERT Knowledge Management Repository