- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.


Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Apple Security Advisory
Apple published security updates highlighting vulnerabilities in the following products on November 4, 2026. It is recommended that you take the necessary precautions by ensuring your products are always updated. Safari – versions…

Apple Security Advisory
Apple published a security advisory highlighting vulnerabilities in multiple products on July 29, 2025. It is recommended that you take the necessary precautions by ensuring…

Oracle Security Advisory
Oracle published security updates highlighting vulnerabilities in the following products on March 19, 2026. It is recommended that you take the necessary precautions by ensuring…

Interlock Ransomware Exp
Description Security researchers have reported that the Interlock ransomware operation has been exploiting a critical vulnerability in Cisco Secure Firewall Management Center (FMC) software as a zero-day…

Hits 400+ Code Repositor
Description Security researchers have identified a large-scale software supply-chain attack involving the Glassworm malware campaign, which has compromised more than 400 code repositories and packages across development platforms such…

Government Warns of Sign
Description Dutch intelligence agencies have issued a cybersecurity warning regarding a large-scale campaign targeting user accounts on the messaging platforms Signal and WhatsApp. According to the General…

Understanding the Danger
Deepfakes are synthetic media created using artificial intelligence that can convincingly manipulate or fabricate audio, images, or videos to make individuals appear to say or…

Use Isolated Development
Develop and test in isolated VMs or containers never use production credentials or store secrets in source code. Keep dev machines network-segmented, use short-lived credentials…

Implement Application Al
Application allowlisting (whitelisting) prevents unauthorized programs from running by permitting only approved applications, scripts, and installers; to deploy it effectively, inventory your software, start policies…


