- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.


Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

VMware security advisory
VMware security has published a security advisory highlighting vulnerabilities in the following products on June 18th, 2025. It is recommended that you take the necessary…

Cisco Security Security
Cisco Security has published a security advisory highlighting vulnerabilities in the following products on June 18th, 2025. It is recommended that you take the necessary…

Atlassian Security Advis
Atlassian security has published a security advisory highlighting vulnerabilities in the following products on June 17th, 2025. It is recommended that you take the necessary…

New Secure Boot Flaw Ena
Description Security researchers have disclosed a critical Secure Boot bypass vulnerability, tracked as CVE-2025-3052, that allows attackers to disable security protections on PCs and servers,…

Anubis Ransomware Adds W
Description The Anubis ransomware-as-a-service (RaaS) operation, first identified in December 2024, has evolved into a more destructive threat by incorporating a wiper module that permanently…

FIN6 Hackers Pose as Job
Description The FIN6 threat group, also known as “Skeleton Spider,” has launched a sophisticated social engineering campaign targeting human resource (HR) professionals and recruiters. Unlike…

Think Before You Post (J
Be mindful of what you post online, as the internet never truly forgets. Even if you delete something, it can be copied, saved, or shared…

Control Building Access
Cybersecurity isn’t just about firewalls and passwords physical security is just as critical. Limiting and monitoring building access helps prevent unauthorized individuals from gaining entry…

Immediately Remove Login
One of the most overlooked cyber threats comes from within the organization—former employees who still have active access to systems and data. If user accounts,…