News and articles
Through the necessary security strategies and tools combating cyber threats.
Oracle VirtualBox Vulnerability Detected: Your Systems Are at Risk
In the digital age, virtualization technologies have become an integral ...
Advanced Defense Against Phishing: An Essential Guide for CISOs
In the digital era, cybersecurity demands constant vigilance, and phishing ...
Dangerous “Nullpoint-Stealer” on GitHub: A Real Threat Disguised as a Research Tool
In the spring of 2025, the cybersecurity community faced yet ...
Bypassing Phishing-Resistant MFA: New Vulnerability Discovered in Microsoft Entra ID
A new concern has emerged in the cybersecurity landscape. Security ...
Hidden Threat Behind a Fake Security Tool: WordPress Plugin Malware Takes Full Control of Your Site
WordPress is one of the most popular platforms for building ...
OWASP Top 10: Key Principles for Securing Web Applications
In today’s digital age, web applications have become an integral ...
CISA: Real-World Attacks Exploit Vulnerability in SAP Servers
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the ...
Avast Vulnerability Enables Full System Takeover: Users Must Stay Vigilant!
Cybersecurity experts have reported the discovery of a highly dangerous ...
Windows LNK Vulnerability: Microsoft Overlooks Security
In today’s digital landscape, cybersecurity is more vital than ever ...
+99871 203 00 23
info[at]uzcert.uz
Report cyber incident:
incident[at]uzcert.uz
Tashkent city, Mirabad district, Taras Shevchenko street 20