The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.

...

Cybersecurity Awareness

Information, details and cybersecurity knowledge that everyone should be aware of

CA082022_165 Browser Updates: Featured Image

Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Ref# CA082022_165
CA082022_166 Software Decommissioning: Featured Image

It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Ref# CA082022_166
CA082022_167 Safe Disposal: Featured Image

Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Ref# CA082022_167

Recent Avisories

Official media releases in regards to matter relation to cybersecurity and works of the Guyana CIRT Team.

default place holder featured graphics

Android has published a security advisory highlighting vulnerabilities in the following product on February 3rd, 2025. It is recommended that you take the necessary precautions…

Ref# ADV2025_34
default place holder featured graphics

Ubuntu has published a security advisory highlighting vulnerabilities in the following products between January 27th and February 2nd, 2025. It is recommended that you take…

Ref# ADV2025_33
default place holder featured graphics

Dell has published a security advisory highlighting vulnerabilities in the following products between January 27th and February 2nd, 2025. It is recommended that you take…

Ref# ADV2025_32

Recent Alerts

Publication by the Guyana CIRT Team regarding possible cybersecurity risk and vulnerabilities.

default place holder featured graphics

Description  Process Hollowing is a code injection technique commonly employed by malware to evade detection. It involves creating a legitimate process in a suspended state,…

Ref# AL2025_05
default place holder featured graphics

Description  A phishing campaign has been identified, targeting Microsoft advertisers through malicious Google Ads. Attackers are leveraging sponsored search results to impersonate Microsoft’s advertising platform,…

Ref# AL2025_04
default place holder featured graphics

Description  A newly discovered ChatGPT jailbreak, dubbed Time Bandit, enables users to bypass OpenAI’s safety measures and gain access to restricted content on sensitive topics.…

Ref# AL2025_03 Time

Recent Tips

Expert Informtion provided by the Guyana Cirt Team in matters relating to cybersecurity.

default place holder featured graphics

Creating an effective business social media presence begins with social media verification. Verifying your accounts not only makes your official social channels more accessible but…

Ref# T2024_09
default place holder featured graphics

When setting up password policies for your organization, it’s crucial to address the common yet often overlooked risk of keyboard walk patterns. These are passwords…

Ref# T2024_08 Preventing
default place holder featured graphics

Before integrating generative AI copilots into your organization, ensure that your data security foundations are robust. Start by right-sizing user permissions to prevent overly broad…

Ref# T2024_07