CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-XxEhCs_IuH6KnQtBlh1YSA' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Sun, 05 Oct 2025 16:45:28 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 15:35:41 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210077-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759764940.193749,VS0,VE1293
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8359
CERT.tg
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
CERT.tg
Team Information | |
---|---|
Team name | CERT.tg |
Official team name | CERT TOGO |
Member since | May 20, 2022 |
Host organization | Agence Nationale de Cybersécurité (ANCy) |
Country of team | Togo TG |
Date of establishment | 2019-02-13 |
Website | https://cert.tg/ |
Team Contact Information | |
---|---|
Facsimile number | N/A |
Business Hours | |
---|---|
Timezone | UTC/GMT+0 |
Description of business hours | 24/7 Availability Full team availability : Monday - Friday (From 8 am to 7 pm) |
How to contact outside business hours | CERT.tg is available 24/7. |
Constituency | |
---|---|
Type of Constituency | Government, Private and Public sectors |
Source of Constituency | Both external and internal |
Description of Constituency | CERT.tg is Togo's National Computer Emergency Response Team. Its mission is to identify, analyze and mitigate threats against the Togolese state, state administrations, agencies and bodies, Togolese businesses and all Togolese citizens. CERT.tg contributes to ensuring the cybersecurity of the Togolese nation. |
Internet Domain Address | *.tg |
Country of Constituency | Togo TG |
Cryptography | |
---|---|
PGP key id | 0x52AAB4F4709FE4F5 |
PGP fingerprint | C7C2955D82B00D69EF787A3D52AAB4F4709FE4F5 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=zN8l
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.