- Week in Review
The Guyana National Computer Incident Response Team (GNCIRT) seeks to provide technical assistance to public agencies to prevent and respond effectively to information security incidents of national importance.
Browser Updates
Get Safe Online recommends that for optimum protection against fraud when using the internet, you always run the latest version of your chosen browser that…
Software Decommissioning
It is important that you carry out regular reviews or audits of application software on all computers and information systems, and ensure that redundant software…
Safe Disposal
Smartphones and tablets that you no longer need should be disposed of with great care. The data on your device can easily be accessed whether…
Cisco Security Advisory
Cisco has published a security advisory highlighting vulnerabilities in the following products on January 22nd, 2025. It is recommended that you take the necessary precautions…
Oracle Security Advisory
Oracle has published a security advisory highlighting vulnerabilities in the following products on January 21st, 2025. It is recommended that you take the necessary precautions…
HPE Security Advisory (J
HPE has published a security advisory highlighting vulnerabilities in the following product on January 17th, 2025. It is recommended that you take the necessary precautions…
Critical Zero-Day Vulner
Description Two critical zero-day vulnerabilities have been discovered in WordPress products widely used in real estate websites: the RealHome theme and the Easy Real Estate…
New Rockstar 2FA Phishin
Description Rockstar 2FA is a new phishing-as-a-service (PhaaS) platform facilitating adversary-in-the-middle (AiTM) attacks to compromise Microsoft 365 accounts, bypassing multifactor authentication (MFA). This sophisticated platform,…
BootKitty UEFI Malware E
Description BootKitty is a newly identified UEFI (Unified Extensible Firmware Interface) bootkit targeting Linux systems, exploiting a firmware vulnerability known as LogoFAIL (CVE-2023-40238). Discovered by…
Why should businesses ve
Creating an effective business social media presence begins with social media verification. Verifying your accounts not only makes your official social channels more accessible but…
Weak Passwords from Keyb
When setting up password policies for your organization, it’s crucial to address the common yet often overlooked risk of keyboard walk patterns. These are passwords…
Strengthen Your Data Sec
Before integrating generative AI copilots into your organization, ensure that your data security foundations are robust. Start by right-sizing user permissions to prevent overly broad…