- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.


Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…

Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…

Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…

Apple Security Advisory
Apple published security updates to address a vulnerability in the following products on September 29th, 2025. It is recommended that you take these necessary precautions…

VMware Security Advisory
VMware published security advisories to address vulnerabilities in the following products on September 29th, 2025. It is recommended that you take these necessary precautions by…

Red Hat Security Advisor
Red Hat published a security advisory highlighting vulnerabilities in the following products between September 22nd and 28th, 2025. It is recommended that you take these necessary…

New MatrixPDF toolkit tu
Description A new phishing and malware distribution toolkit called MatrixPDF has been discovered on cybercrime forums, enabling threat actors to transform ordinary PDF files into…

Cisco ASA and FTD Zero-D
Description Cisco has released emergency security patches for three critical zero-day vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) software, two…

LockBit 5.0 Emerges- Cro
Description A new iteration of the LockBit ransomware marketed as LockBit 5.0 has been observed in the wild. This variant includes cross-platform binaries (Windows, Linux,…

Beware of Typosquatting
Cybercriminals often register domains that mimic legitimate websites using typosquatting (e.g., “amaz0n.com” instead of “amazon.com”) or homograph attacks with look-alike characters from different alphabets, making…

Verify Installers and Di
Only download software from official vendor sites and check the installer’s digital signature or publisher before running it. Right-click the downloaded file → Properties →…

Watch Out for Fake Downl
Cybercriminals often manipulate search engine ads and results to make malicious download pages appear above legitimate ones. These sites may look identical to official vendor…