- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.


Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Android Security Advisor
Android has published a security advisory highlighting vulnerabilities in the following product on April 7th, 2025. It is recommended that you take the necessary precautions…

Ubuntu Security Advisory
Ubuntu has published a security advisory to address vulnerabilities affecting the following products between March 31st and April 6th, 2025. It is recommended that you…

Dell Security Advisory (
Dell has published a security advisory to address vulnerabilities affecting the following products between March 31st and April 6th, 2025. It is recommended that you…

WinRAR Vulnerability CVE
Description A newly disclosed vulnerability in WinRAR, tracked as CVE-2025-31334, allows attackers to bypass Windows’ Mark of the Web (MotW) security mechanism. This flaw affects…

Critical RCE Vulnerabili
Description A critical remote code execution (RCE) vulnerability (CVE-2025-30065) has been discovered in Apache Parquet, a widely used columnar storage format for big data and…

Cisco CSLU Backdoor Admi
Description Cisco has issued a critical security warning regarding a built-in backdoor administrative account found in the Cisco Smart Licensing Utility (CSLU). The vulnerability, identified…

Immediately Remove Login
One of the most overlooked cyber threats comes from within the organization—former employees who still have active access to systems and data. If user accounts,…

Disable Unused Network P
An important and often overlooked security practice is disabling unused network ports both physical and logical. Open but inactive ports can be exploited by attackers…

Use Group-Based NT Login
To maintain strong security and streamline user access, network administrators should utilize Active Directory (AD) groups to manage NT logins and desktop privileges. Instead of…