The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.

...

Cybersecurity Awareness

Information, details and cybersecurity knowledge that everyone should be aware of

CA082022_165 Browser Updates: Featured Image

Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Ref# CA082022_165
CA082022_166 Software Decommissioning: Featured Image

It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Ref# CA082022_166
CA082022_167 Safe Disposal: Featured Image

Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Ref# CA082022_167

Recent Avisories

Official media releases in regards to matter relation to cybersecurity and works of the Guyana CIRT Team.

default place holder featured graphics

Ubuntu published a security advisory highlighting vulnerabilities in the following product between March 02nd, 2026. It is recommended that you take the necessary precautions by ensuring your products are always…

Ref# ADV2026_122
default place holder featured graphics

Dell published a security advisory highlighting vulnerabilities in the following product between March 02nd, 2026. It is recommended that you take the necessary precautions by…

Ref# ADV2026_121
default place holder featured graphics

IBM published a security advisory highlighting vulnerabilities in the following product between March 02nd, 2026. It is recommended that you take the necessary precautions by ensuring your products are always updated. …

Ref# ADV2026_120

Recent Alerts

Publication by the Guyana CIRT Team regarding possible cybersecurity risk and vulnerabilities.

default place holder featured graphics

Description  The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning that a malware strain known as RESURGE can remain dormant on compromised Ivanti devices, even…

Ref# AL2026_02
default place holder featured graphics

Description  Researchers have reported a growing trend of cybercriminals bypassing identity verification (IDV) systems using advanced deepfake technology and injection attacks. Threat actors are leveraging AI-generated synthetic identities, manipulated…

Ref# AL2026_01
default place holder featured graphics

Description Researchers have observed a coordinated campaign (tracked as TigerJack) that publishes malicious Visual Studio Code (VSCode) extensions to both the Microsoft VSCode Marketplace and…

Ref# AL2025_51

Recent Tips

Expert Informtion provided by the Guyana Cirt Team in matters relating to cybersecurity.

default place holder featured graphics

Develop and test in isolated VMs or containers never use production credentials or store secrets in source code. Keep dev machines network-segmented, use short-lived credentials…

Ref# T2025_33
default place holder featured graphics

Application allowlisting (whitelisting) prevents unauthorized programs from running by permitting only approved applications, scripts, and installers; to deploy it effectively, inventory your software, start policies…

Ref# T2025_32
default place holder featured graphics

Public charging stations in airports, hospitals, and other public places may seem convenient, but they can also expose your device to serious cybersecurity risks. Cybercriminals…

Ref# T2025_31