The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.

...

Cybersecurity Awareness

Information, details and cybersecurity knowledge that everyone should be aware of

CA082022_165 Browser Updates: Featured Image

Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Ref# CA082022_165
CA082022_166 Software Decommissioning: Featured Image

It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Ref# CA082022_166
CA082022_167 Safe Disposal: Featured Image

Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Ref# CA082022_167

Recent Avisories

Official media releases in regards to matter relation to cybersecurity and works of the Guyana CIRT Team.

default place holder featured graphics

Adobe has published a security advisory highlighting vulnerabilities in the following products on June 11th, 2024. It is recommended that you take the necessary precautions…

Ref# ADV2024_198
default place holder featured graphics

Microsoft has published a security advisory highlighting vulnerabilities in the following product on June 11th, 2024. It is recommended that you take the necessary precautions…

Ref# ADV2024_197
default place holder featured graphics

Mozilla has published a security advisory highlighting vulnerabilities in the following products on June 11th, 2024. It is recommended that you take the necessary precautions…

Ref# ADV2024_196

Recent Alerts

Publication by the Guyana CIRT Team regarding possible cybersecurity risk and vulnerabilities.

default place holder featured graphics

Description  The DarkGate malware-as-a-service (MaaS) operation has transitioned from using AutoIt scripts to an AutoHotkey mechanism in its latest cyberattacks. This change highlights the persistent…

Ref# AL2024_08
default place holder featured graphics

Description  Hackers are leveraging a trojanized Minesweeper clone to target finance organizations. The malicious game is used to deploy malware and steal sensitive data, posing…

Ref# AL2024_07
default place holder featured graphics

The GPOC is NOT sending text messages about package delivery requiring payment!  Scammers are targeting GPOC customers with phishing messages. Here’s how the scam works: …

Ref# AL2024_06

Recent Tips

Expert Informtion provided by the Guyana Cirt Team in matters relating to cybersecurity.

default place holder featured graphics

To safeguard your organization’s most important assets, start by identifying your key business processes and the technology that supports them, including application servers, databases, and…

Ref# T2024_01
default place holder featured graphics

It is advisable to refrain from using your work email address on publicly accessible internet websites. Work emails often contain sensitive information related to your…

Ref# T2023_08
default place holder featured graphics

To access your data, hackers can target your systems and networks using a variety of techniques, including malware, viruses, phishing assaults, trojans, spyware, etc. Your…

Ref# T2023_07