- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.


Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Ivanti Security Advisory
Ivanti published security advisories to address vulnerabilities in multiple products between October 13 and 14, 2025. It is recommended that you take these necessary precautions…

Red Hat Security Advisor
Red Hat published security advisories to address vulnerabilities in multiple products between October 6 and 12, 2025. It is recommended that you take these necessary…

IBM Security Advisory (O
IBM has published a security advisory highlighting vulnerabilities in several products between October 6th, 2025 – October 12th, 2025. It is recommended that you take…

Oracle E-Business Suite
Description Oracle has released an emergency security update to address a critical, unauthenticated remote-code-execution vulnerability in Oracle E-Business Suite (CVE-2025-61882, CVSS 9.8). Threat actors linked…

Discord Support-Ticket B
Description Discord disclosed that an unauthorized party gained limited access to a third-party customer service/ticketing system used by Discord, exposing support tickets and associated user…

Microsoft Outlook Stops
Description Microsoft has implemented a security change in Outlook to block the display of inline SVG (Scalable Vector Graphics) images, following recent phishing campaigns that…

Be Cautious When Using P
Public charging stations in airports, hospitals, and other public places may seem convenient, but they can also expose your device to serious cybersecurity risks. Cybercriminals…

Review and Revoke Unused
Many users unknowingly grant excessive permissions to third-party applications connected to their email, social media, or cloud accounts, leaving them vulnerable long after those apps…

Secure Your Home and Wor
Unsecured wireless networks are a common entry point for cyberattacks, allowing unauthorized users to intercept sensitive data, launch on-path attacks, or gain access to connected…