TT-CSIRT Collaborates in Cyber Subject Matter Expert Exchange (SMEE) 2026

TT-CSIRT Collaborates in Cyber Subject Matter Expert Exchange (SMEE) 2026

The Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT), under the Ministry of Homeland Security (MHS), collaborated in the Cyber Subject Matter Expert Exchange (SMEE) 2026. The engagement brought together local, regional, and international stakeholders to strengthen cybersecurity capabilities through structured knowledge sharing and technical dialogue. Advancing Cybersecurity Through Collaboration SMEE 2026 emphasized the […]

MHS and TATT Sign MOU to Strengthen National Cybersecurity Collaboration

The Ministry of Homeland Security (MHS), through the Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT), signed a Memorandum of Understanding (MOU) with the Telecommunications Authority of Trinidad and Tobago (TATT), formalizing a strategic partnership to enhance national cybersecurity coordination. Purpose of the Agreement The MOU establishes a collaborative framework between MHS/TT-CSIRT and TATT […]

Webinar: Web Application Security

The Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT) of the Ministry of National Security hosted a webinar on Web Application Security during cyber security awareness month providing an insightful webinar on Application Security Strategies, the OWASP Top 10, Application Security Verification and Application Testing guidance. TLP:CLEAR http://192.168.70.12/wp-content/uploads/2024/07/appsec.pdf

TT-CSIRT-410.9.11.22: New Emotet Malware Campaign

Emotet is back again with a new campaign displaying many characteristics of older campaigns. Cisco Talos has observed an increased activity of spam distributing this new strain beginning in early November 2022, and the volume of spam and Emotet infrastructure has been increasing since then to target multiple geographies around the world. Emotet is a […]

SonicWall Cyber Threat Report 2018

The modern cyberwar — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. Many are simple and effective. Others are targeted and complex. Yet they are all highly dynamic and require persistence, commitment and resources to mitigate. Further information on this topic can be found […]

Cisco: 2018 Annual Cybersecurity Report

What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Further information on this topic can be found in the […]

OWASP: Top Ten Most Critical Web Application Vulnerabilities For 2017

Insecure software is undermining critical infrastructure woldwide. As our infrastructure becomes increasingly complex and connected, the difficulty of achieving application security increases exponentially. Further information on this topic can be found in the article entitled “OWASP: Top Ten Most Critical Web Application Vulnerabilities For 2017” which can be downloaded via the TTCSIRT Website at https://ttcsirt.gov.tt/documents/owasp2017.pdf

OPUS: Six Strategies for Defense-in-Depth

Serious issues often originate inside the network: everything from worms, viruses, and Trojan horses to unsecured wireless networks, peer-to-peer mobile communications and guest users can compromise the security of corporate networks. Thus, to address these threats, the corporate network should no longer be a single homogeneous zone in which users connect from anywhere in the […]

Phishing Activity Trends Report 2017

Phishing is a criminal mechanism employing both social engineering and technical subterfuge to steal consumers’ personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails purporting to be from legitimate businesses and agencies, designed to lead consumers to counterfeit websites that trick recipients into divulging financial data such as usernames and passwords. […]

Defending Against Phishing Attacks

Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people’s lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is “phishing”, in which, attackers attempt to steal the user’s credentials using fake […]