top of page
![office-table-with-blank-notebook-and-laptop-coff.jpg](https://static.wixstatic.com/media/c3b6f9_9c0e7d3d91be4807863fac98ed6e740b~mv2.jpg/v1/fill/w_100,h_67,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/c3b6f9_9c0e7d3d91be4807863fac98ed6e740b~mv2.jpg)
Blogs
![Navigating the Generative AI Cyber Threat Landscape: Building Organizational Resilience](https://static.wixstatic.com/media/7ba579_69d66bcba100447481214926f64203a0~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_69d66bcba100447481214926f64203a0~mv2.webp)
Siriluk Sithsakonkul
Feb 21 min read
Navigating the Generative AI Cyber Threat Landscape: Building Organizational Resilience
The cyber threats from advanced generative AI and strategies for organizational resilience.
310
![](https://static.wixstatic.com/media/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp)
![Protect Your Business from Mirai Botnet Attacks: Act Now to Secure Your Devices](https://static.wixstatic.com/media/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/9e35bf_e3c15e3f87ec48308e43bed78b14a6df~mv2.webp)
chanasananp
Jan 272 min read
Protect Your Business from Mirai Botnet Attacks: Act Now to Secure Your Devices
The Threat is Real: Mirai Botnet Attacks on the Rise
30
![](https://static.wixstatic.com/media/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.webp)
![Strengthen Your Cybersecurity with Zabbix and Modbus Protocol Integration](https://static.wixstatic.com/media/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_auto/9e35bf_bf4d1eda2f554b9e8fb20f96af3ec920~mv2.webp)
chanasananp
Jan 241 min read
Strengthen Your Cybersecurity with Zabbix and Modbus Protocol Integration
Monitoring for a Safer, Smarter Future
80
!["2025—A Critical Year for Cybersecurity: Are You Truly Secure?"](https://static.wixstatic.com/media/9e35bf_7e65f7f4aa774833983567fc1371904e~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/9e35bf_7e65f7f4aa774833983567fc1371904e~mv2.webp)
chanasananp
Jan 152 min read
"2025—A Critical Year for Cybersecurity: Are You Truly Secure?"
Are You Really Safe?
130
![](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
![Critical Vulnerability Alert: FortiManager - OS Command Injection (CVE-2024-48889)](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
chanasananp
Dec 27, 20241 min read
Critical Vulnerability Alert: FortiManager - OS Command Injection (CVE-2024-48889)
An OS Command Injection vulnerability ( CWE-78 ) in FortiManager allows an authenticated remote attacker to execute unauthorized commands...
400
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Critical vulnerability warning of Microsoft Product (DECEMBER-2024)](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
-
Dec 14, 20245 min read
Critical vulnerability warning of Microsoft Product (DECEMBER-2024)
Involved staffs should do the risk assessment and fix immediately. The fixing detail and patch are in table below
1870
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Critical Security Vulnerability in Windows Kerberos Authentication Protocol: CVE-2024-43639](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
chanasananp
Nov 29, 20241 min read
Critical Security Vulnerability in Windows Kerberos Authentication Protocol: CVE-2024-43639
A high-severity flaw in Windows Kerberos authentication protocol allows remote code execution. Immediate review and patching are recommended
270
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![⚠️Critical Vulnerabilities in PAN-OS: Authentication Bypass and Privilege Escalation](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 21, 20241 min read
⚠️Critical Vulnerabilities in PAN-OS: Authentication Bypass and Privilege Escalation
CVE-2024-0012 and CVE-2024-9474 expose critical risks in PAN-OS management web interface. Immediate action is required to secure your system
60
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Palo Alto Networks Advises Customers to Secure PAN-OS Management Interface Amid RCE Vulnerability Claims](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 18, 20241 min read
Palo Alto Networks Advises Customers to Secure PAN-OS Management Interface Amid RCE Vulnerability Claims
Claims of a remote code execution vulnerability in the PAN-OS management interface prompt Palo Alto Networks to issue guidance for securing
20
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![SAP July 2024 Security Updates: Critical Vulnerabilities Addressed](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 18, 20241 min read
SAP July 2024 Security Updates: Critical Vulnerabilities Addressed
SAP fixes two critical vulnerabilities (CVE-2024-39592, CVE-2024-39597) and 15 medium-level vulnerabilities across various products. Apply p
30
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![Medium-Risk Vulnerability in Citrix Session Recording: Update Required](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 18, 20241 min read
Medium-Risk Vulnerability in Citrix Session Recording: Update Required
Vulnerabilities in Citrix Session Recording (CVE-2024-8068, CVE-2024-8069) may allow privilege escalation, data theft, and system disruption
30
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![🔴High-Risk Vulnerability in NetScaler ADC and Gateway: Immediate Action Recommended](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 15, 20241 min read
🔴High-Risk Vulnerability in NetScaler ADC and Gateway: Immediate Action Recommended
Memory safety vulnerabilities (CVE-2024-8534, CVE-2024-8535) pose risks of Denial of Service attacks in NetScaler ADC and Gateway
10
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![🔴 Critical Vulnerability Alert: Palo Alto Networks Firewall Management Interface Exposed to Remote Command Execution](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
nutthananp
Nov 15, 20241 min read
🔴 Critical Vulnerability Alert: Palo Alto Networks Firewall Management Interface Exposed to Remote Command Execution
Critical vulnerability in Palo Alto Networks Firewall Management Interface (CVSS 9.3) allows remote command execution.
00
![](https://static.wixstatic.com/media/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.webp)
![8 steps for IT system security that IT managers should not miss](https://static.wixstatic.com/media/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.jpg/v1/fill/w_306,h_229,fp_0.50_0.50,q_90,enc_auto/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.webp)
Siriluk Sithsakonkul
Oct 6, 20242 min read
8 steps for IT system security that IT managers should not miss
Learn about crucial cybersecurity measures like vulnerability assessments, patch management, security tools, and more.
10
![](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
![Cyber Threat Alert: Protect Your Organization from Hacked Websites](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
Siriluk Sithsakonkul
Oct 6, 20241 min read
Cyber Threat Alert: Protect Your Organization from Hacked Websites
Protect Your Organization from Hacked Websites
00
![Mitigating Enterprise Risk in the Digital Age: The Strategic Imperative of Robust IT and Security Governance](https://static.wixstatic.com/media/7ba579_ab23ce9c0fba4d1db2b03f94011a5d19~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_ab23ce9c0fba4d1db2b03f94011a5d19~mv2.webp)
Siriluk Sithsakonkul
Jul 28, 20242 min read
Mitigating Enterprise Risk in the Digital Age: The Strategic Imperative of Robust IT and Security Governance
Safeguard your enterprise in the digital age. Learn why robust IT and security governance is essential for mitigating risk.
00
![](https://static.wixstatic.com/media/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp)
![🤔 About CrowdStrike incident !!](https://static.wixstatic.com/media/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp/v1/fill/w_306,h_229,al_c,q_90,enc_auto/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp)
Siriluk Sithsakonkul
Jul 24, 20241 min read
🤔 About CrowdStrike incident !!
A poll to collect a comment from audience for the Crowdstrike incident - Jul19,2024
00
![Mobile Application Management](https://static.wixstatic.com/media/7ba579_9d24e217d2a04ad0923b69e0bc3823e0~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_9d24e217d2a04ad0923b69e0bc3823e0~mv2.webp)
Siriluk Sithsakonkul
Jul 16, 20242 min read
Mobile Application Management
Discover how Mobile Application Management (MAM) is crucial for tackling cyber threats in today's mobile-centric world.
00
![Mobile Enterprise/Device Management (MDM)](https://static.wixstatic.com/media/7ba579_39223fc06e64405689232f61773144f5~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_39223fc06e64405689232f61773144f5~mv2.webp)
Siriluk Sithsakonkul
Jul 16, 20242 min read
Mobile Enterprise/Device Management (MDM)
Securing the Mobile Frontier: The Critical Role of MDM in Today's Digital Society The security challenges in Mobile Device Management...
00
Contact Us Today For A Free Consultation By Phone Or Email!
![Image (2).png](https://static.wixstatic.com/media/c3b6f9_1e69880459ee4092b4a338ba6a7f316a~mv2.png/v1/fill/w_100,h_43,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/c3b6f9_1e69880459ee4092b4a338ba6a7f316a~mv2.png)
Need More Information?
Contact our expert team today, whether you need more information, specific consultations, or immediate issue resolution, we are ready to assist you with just one click.
Greenwill Solution is ready to help you achieve your technology goals efficiently and securely.
bottom of page