Report Incident
National Cybersecurity Reporting Hub
Report a Cybersecurity Incident
Share suspicious activity, fraud, malware, service disruption, or data exposure with the GCSA Security Operations Center. You may report anonymously.
Private evidence handling
Structured triage workflow
Anonymous reporting supported
Before you submit
- Include timelines, systems affected, and what you observed.
- Upload screenshots, PDFs, or images that help the SOC assess the incident.
- If safety is at risk or critical systems are offline, contact the SOC immediately after submitting.
What happens next
- Your report is logged and assigned a unique GCSA incident ID.
- The SOC reviews severity, evidence, and classification.
- Critical cases may be escalated for coordinated response.
Recommended evidence
- Screenshots of suspicious messages or payment requests
- PDF exports, logs, or account notifications
- Dates, systems affected, and observed attacker behavior
SOC intake controls
- CSRF protection
- Rate limiting
- Captcha verification
- Private evidence storage