News and articles

Through the necessary security strategies and tools combating cyber threats.

Oracle VirtualBox Vulnerability Detected: Your Systems Are at Risk

In the digital age, virtualization technologies have become an integral ...

Advanced Defense Against Phishing: An Essential Guide for CISOs

In the digital era, cybersecurity demands constant vigilance, and phishing ...

Dangerous “Nullpoint-Stealer” on GitHub: A Real Threat Disguised as a Research Tool

In the spring of 2025, the cybersecurity community faced yet ...

Bypassing Phishing-Resistant MFA: New Vulnerability Discovered in Microsoft Entra ID

A new concern has emerged in the cybersecurity landscape. Security ...

Hidden Threat Behind a Fake Security Tool: WordPress Plugin Malware Takes Full Control of Your Site

WordPress is one of the most popular platforms for building ...

OWASP Top 10: Key Principles for Securing Web Applications

In today’s digital age, web applications have become an integral ...

CISA: Real-World Attacks Exploit Vulnerability in SAP Servers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the ...

Avast Vulnerability Enables Full System Takeover: Users Must Stay Vigilant!

Cybersecurity experts have reported the discovery of a highly dangerous ...

Windows LNK Vulnerability: Microsoft Overlooks Security

In today’s digital landscape, cybersecurity is more vital than ever ...

+99871 203 00 23

info[at]uzcert.uz
Report cyber incident:
incident[at]uzcert.uz

Tashkent city, Mirabad district, Taras Shevchenko street 20