top of page
![office-table-with-blank-notebook-and-laptop-coff.jpg](https://static.wixstatic.com/media/c3b6f9_9c0e7d3d91be4807863fac98ed6e740b~mv2.jpg/v1/fill/w_100,h_67,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/c3b6f9_9c0e7d3d91be4807863fac98ed6e740b~mv2.jpg)
Blogs
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![⚠️ Critical Zero-Click Vulnerability in Microsoft Outlook (CVE-2025-21298) – Immediate Action Required!](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
Siriluk Sithsakonkul
6 days ago1 min read
⚠️ Critical Zero-Click Vulnerability in Microsoft Outlook (CVE-2025-21298) – Immediate Action Required!
Zero-Click RCE ที่เปิดช่องให้แฮกเกอร์เข้าควบคุมเครื่อง
50
![](https://static.wixstatic.com/media/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp)
![Protect Your Business from Mirai Botnet Attacks: Act Now to Secure Your Devices](https://static.wixstatic.com/media/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp)
chanasananp
Jan 272 min read
Protect Your Business from Mirai Botnet Attacks: Act Now to Secure Your Devices
The Threat is Real: Mirai Botnet Attacks on the Rise
30
![](https://static.wixstatic.com/media/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.webp)
![Strengthen Your Cybersecurity with Zabbix and Modbus Protocol Integration](https://static.wixstatic.com/media/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_auto/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.webp)
chanasananp
Jan 241 min read
Strengthen Your Cybersecurity with Zabbix and Modbus Protocol Integration
Monitoring for a Safer, Smarter Future
80
!["2025—A Critical Year for Cybersecurity: Are You Truly Secure?"](https://static.wixstatic.com/media/9e35bf_7e65f7f4aa774833983567fc1371904e~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/9e35bf_7e65f7f4aa774833983567fc1371904e~mv2.webp)
chanasananp
Jan 152 min read
"2025—A Critical Year for Cybersecurity: Are You Truly Secure?"
Are You Really Safe?
130
![](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
![Critical Vulnerability Alert: FortiManager - OS Command Injection (CVE-2024-48889)](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
chanasananp
Dec 27, 20241 min read
Critical Vulnerability Alert: FortiManager - OS Command Injection (CVE-2024-48889)
An OS Command Injection vulnerability ( CWE-78 ) in FortiManager allows an authenticated remote attacker to execute unauthorized commands...
400
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Critical vulnerability warning of Microsoft Product (DECEMBER-2024)](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
-
Dec 14, 20245 min read
Critical vulnerability warning of Microsoft Product (DECEMBER-2024)
Involved staffs should do the risk assessment and fix immediately. The fixing detail and patch are in table below
1870
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Critical Security Vulnerability in Windows Kerberos Authentication Protocol: CVE-2024-43639](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
chanasananp
Nov 29, 20241 min read
Critical Security Vulnerability in Windows Kerberos Authentication Protocol: CVE-2024-43639
A high-severity flaw in Windows Kerberos authentication protocol allows remote code execution. Immediate review and patching are recommended
270
![](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
![Helldown Ransomware: A New Threat Targeting VMware ESXi Systems and Zyxel Firewalls](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
nutthananp
Nov 22, 20242 min read
Helldown Ransomware: A New Threat Targeting VMware ESXi Systems and Zyxel Firewalls
Helldown ransomware exploits vulnerabilities in VMware ESXi and Zyxel Firewalls to steal data, disable backups, and demand ransoms. Protect
10
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![⚠️Critical Vulnerabilities in PAN-OS: Authentication Bypass and Privilege Escalation](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 21, 20241 min read
⚠️Critical Vulnerabilities in PAN-OS: Authentication Bypass and Privilege Escalation
CVE-2024-0012 and CVE-2024-9474 expose critical risks in PAN-OS management web interface. Immediate action is required to secure your system
60
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Palo Alto Networks Advises Customers to Secure PAN-OS Management Interface Amid RCE Vulnerability Claims](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 18, 20241 min read
Palo Alto Networks Advises Customers to Secure PAN-OS Management Interface Amid RCE Vulnerability Claims
Claims of a remote code execution vulnerability in the PAN-OS management interface prompt Palo Alto Networks to issue guidance for securing
20
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![SAP July 2024 Security Updates: Critical Vulnerabilities Addressed](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 18, 20241 min read
SAP July 2024 Security Updates: Critical Vulnerabilities Addressed
SAP fixes two critical vulnerabilities (CVE-2024-39592, CVE-2024-39597) and 15 medium-level vulnerabilities across various products. Apply p
30
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Medium-Risk Vulnerability in Citrix Session Recording: Update Required](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 18, 20241 min read
Medium-Risk Vulnerability in Citrix Session Recording: Update Required
Vulnerabilities in Citrix Session Recording (CVE-2024-8068, CVE-2024-8069) may allow privilege escalation, data theft, and system disruption
30
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![🔴High-Risk Vulnerability in NetScaler ADC and Gateway: Immediate Action Recommended](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 15, 20241 min read
🔴High-Risk Vulnerability in NetScaler ADC and Gateway: Immediate Action Recommended
Memory safety vulnerabilities (CVE-2024-8534, CVE-2024-8535) pose risks of Denial of Service attacks in NetScaler ADC and Gateway
10
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![🔴 Critical Vulnerability Alert: Palo Alto Networks Firewall Management Interface Exposed to Remote Command Execution](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 15, 20241 min read
🔴 Critical Vulnerability Alert: Palo Alto Networks Firewall Management Interface Exposed to Remote Command Execution
Critical vulnerability in Palo Alto Networks Firewall Management Interface (CVSS 9.3) allows remote command execution.
00
![A Property Development Company Uncovers Critical Risks through a Vulnerability Assessment](https://static.wixstatic.com/media/7ba579_1a276ce2ab1a42b19930a6222318412d~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_1a276ce2ab1a42b19930a6222318412d~mv2.webp)
Siriluk Sithsakonkul
Oct 29, 20242 min read
A Property Development Company Uncovers Critical Risks through a Vulnerability Assessment
The preventive measures, like vulnerability assessments, is essential to mitigate risks before they escalate.
00
![](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
![Critical Vulnerability in Fortinet’s FortiManager: Immediate Action Required to Protect Your Organization](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
nutthananp
Oct 29, 20241 min read
Critical Vulnerability in Fortinet’s FortiManager: Immediate Action Required to Protect Your Organization
Discover critical Fortinet FortiManager vulnerability (CVE-2024-47575). Protect your systems with Greenwill Solution’s Patch Management.
00
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Critical Vulnerability Alert: Cisco ASA SSH Root Privilege Escalation Risk](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Oct 29, 20241 min read
Critical Vulnerability Alert: Cisco ASA SSH Root Privilege Escalation Risk
Cisco ASA software has a critical SSH vulnerability (CVE-2024-20329) enabling root access for authenticated attackers. Protect your systems
20
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Critical Vulnerability Alert: Cisco FMC Root Command Injection Risk](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Oct 29, 20241 min read
Critical Vulnerability Alert: Cisco FMC Root Command Injection Risk
Cisco FMC (formerly Firepower Management Center) vulnerability CVE-2024-20424 allows root command execution remotely
00
![](https://static.wixstatic.com/media/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.webp)
![8 steps for IT system security that IT managers should not miss](https://static.wixstatic.com/media/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_auto/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.webp)
Siriluk Sithsakonkul
Oct 6, 20242 min read
8 steps for IT system security that IT managers should not miss
Learn about crucial cybersecurity measures like vulnerability assessments, patch management, security tools, and more.
10
![](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
![Cyber Threat Alert: Protect Your Organization from Hacked Websites](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
Siriluk Sithsakonkul
Oct 6, 20241 min read
Cyber Threat Alert: Protect Your Organization from Hacked Websites
Protect Your Organization from Hacked Websites
00
Contact Us Today For A Free Consultation By Phone Or Email!
![Image (2).png](https://static.wixstatic.com/media/c3b6f9_1e69880459ee4092b4a338ba6a7f316a~mv2.png/v1/fill/w_100,h_43,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/c3b6f9_1e69880459ee4092b4a338ba6a7f316a~mv2.png)
Need More Information?
Contact our expert team today, whether you need more information, specific consultations, or immediate issue resolution, we are ready to assist you with just one click.
Greenwill Solution is ready to help you achieve your technology goals efficiently and securely.
bottom of page