top of page
![office-table-with-blank-notebook-and-laptop-coff.jpg](https://static.wixstatic.com/media/c3b6f9_9c0e7d3d91be4807863fac98ed6e740b~mv2.jpg/v1/fill/w_100,h_67,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/c3b6f9_9c0e7d3d91be4807863fac98ed6e740b~mv2.jpg)
Blogs
![](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
![⚠️ Critical Zero-Click Vulnerability in Microsoft Outlook (CVE-2025-21298) – Immediate Action Required!](https://static.wixstatic.com/media/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_e571a7ab003d4e8e8dec4234870d7f76~mv2.webp)
Siriluk Sithsakonkul
6 days ago1 min read
⚠️ Critical Zero-Click Vulnerability in Microsoft Outlook (CVE-2025-21298) – Immediate Action Required!
Zero-Click RCE ที่เปิดช่องให้แฮกเกอร์เข้าควบคุมเครื่อง
50
![Navigating the Generative AI Cyber Threat Landscape: Building Organizational Resilience](https://static.wixstatic.com/media/7ba579_69d66bcba100447481214926f64203a0~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_69d66bcba100447481214926f64203a0~mv2.webp)
Siriluk Sithsakonkul
Feb 21 min read
Navigating the Generative AI Cyber Threat Landscape: Building Organizational Resilience
The cyber threats from advanced generative AI and strategies for organizational resilience.
310
![A Property Development Company Uncovers Critical Risks through a Vulnerability Assessment](https://static.wixstatic.com/media/7ba579_1a276ce2ab1a42b19930a6222318412d~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_1a276ce2ab1a42b19930a6222318412d~mv2.webp)
Siriluk Sithsakonkul
Oct 29, 20242 min read
A Property Development Company Uncovers Critical Risks through a Vulnerability Assessment
The preventive measures, like vulnerability assessments, is essential to mitigate risks before they escalate.
00
![](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
![Critical Vulnerability in Fortinet’s FortiManager: Immediate Action Required to Protect Your Organization](https://static.wixstatic.com/media/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_5e0cc3cac40c406eb4d2eec1da7a524f~mv2.webp)
nutthananp
Oct 29, 20241 min read
Critical Vulnerability in Fortinet’s FortiManager: Immediate Action Required to Protect Your Organization
Discover critical Fortinet FortiManager vulnerability (CVE-2024-47575). Protect your systems with Greenwill Solution’s Patch Management.
00
![](https://static.wixstatic.com/media/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.webp)
![8 steps for IT system security that IT managers should not miss](https://static.wixstatic.com/media/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.jpg/v1/fill/w_306,h_229,fp_0.50_0.50,q_90,enc_auto/36a788_1a515a167f174d2db93903fa6a1933d5~mv2.webp)
Siriluk Sithsakonkul
Oct 6, 20242 min read
8 steps for IT system security that IT managers should not miss
Learn about crucial cybersecurity measures like vulnerability assessments, patch management, security tools, and more.
10
![](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
![Cyber Threat Alert: Protect Your Organization from Hacked Websites](https://static.wixstatic.com/media/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_f6c330d8cbb94e9ca8aabc03bac1468a~mv2.webp)
Siriluk Sithsakonkul
Oct 6, 20241 min read
Cyber Threat Alert: Protect Your Organization from Hacked Websites
Protect Your Organization from Hacked Websites
00
![Major Fine for Data Protection Violations PDPA: Key Takeaways for Businesses](https://static.wixstatic.com/media/7ba579_2229a62013ab4d1d8ce975dceb62ce56~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_2229a62013ab4d1d8ce975dceb62ce56~mv2.webp)
Siriluk Sithsakonkul
Aug 28, 20242 min read
Major Fine for Data Protection Violations PDPA: Key Takeaways for Businesses
The Personal Data Protection Committee (PDPC) imposing administrative penalties and fines totaling up to 7,000,000 THB.
00
![Mitigating Enterprise Risk in the Digital Age: The Strategic Imperative of Robust IT and Security Governance](https://static.wixstatic.com/media/7ba579_ab23ce9c0fba4d1db2b03f94011a5d19~mv2.png/v1/fill/w_306,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_ab23ce9c0fba4d1db2b03f94011a5d19~mv2.webp)
Siriluk Sithsakonkul
Jul 28, 20242 min read
Mitigating Enterprise Risk in the Digital Age: The Strategic Imperative of Robust IT and Security Governance
Safeguard your enterprise in the digital age. Learn why robust IT and security governance is essential for mitigating risk.
00
![](https://static.wixstatic.com/media/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp/v1/fill/w_250,h_250,al_c,lg_1,q_30,blur_30,enc_auto/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp)
![🤔 About CrowdStrike incident !!](https://static.wixstatic.com/media/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp/v1/fill/w_305,h_229,al_c,q_90,enc_auto/c3b6f9_f22a1949e0fb412fa71f0015e4ae0813~mv2.webp)
Siriluk Sithsakonkul
Jul 24, 20241 min read
🤔 About CrowdStrike incident !!
A poll to collect a comment from audience for the Crowdstrike incident - Jul19,2024
00
![Mobile Application Management](https://static.wixstatic.com/media/7ba579_9d24e217d2a04ad0923b69e0bc3823e0~mv2.png/v1/fill/w_305,h_229,fp_0.50_0.50,q_95,enc_auto/7ba579_9d24e217d2a04ad0923b69e0bc3823e0~mv2.webp)
Siriluk Sithsakonkul
Jul 16, 20242 min read
Mobile Application Management
Discover how Mobile Application Management (MAM) is crucial for tackling cyber threats in today's mobile-centric world.
00
![](https://static.wixstatic.com/media/7ba579_636926b5700b4076864909b5be1d3966~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7ba579_636926b5700b4076864909b5be1d3966~mv2.webp)
![New version google chrome](https://static.wixstatic.com/media/7ba579_636926b5700b4076864909b5be1d3966~mv2.jpg/v1/fill/w_306,h_229,fp_0.50_0.50,q_90,enc_auto/7ba579_636926b5700b4076864909b5be1d3966~mv2.webp)
Siriluk Sithsakonkul
Jun 23, 20243 min read
New version google chrome
Google releases Chrome version 126.0.6478.114/115 for Windows and Mac with critical vulnerability fixes. Google Chrome new version...
10
![](https://static.wixstatic.com/media/7ba579_afda3736da0d40138b3e35e449454902f000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7ba579_afda3736da0d40138b3e35e449454902f000.webp)
![Vulnerabilities Security Update for FortiOS](https://static.wixstatic.com/media/7ba579_afda3736da0d40138b3e35e449454902f000.jpg/v1/fill/w_305,h_229,fp_0.50_0.50,q_90,enc_auto/7ba579_afda3736da0d40138b3e35e449454902f000.webp)
Siriluk Sithsakonkul
Jun 20, 20242 min read
Vulnerabilities Security Update for FortiOS
Critical Buffer Overflow Vulnerability in Fortinet Products (CVE-2024-23110)
10
Contact Us Today For A Free Consultation By Phone Or Email!
![Image (2).png](https://static.wixstatic.com/media/c3b6f9_1e69880459ee4092b4a338ba6a7f316a~mv2.png/v1/fill/w_100,h_43,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/c3b6f9_1e69880459ee4092b4a338ba6a7f316a~mv2.png)
Need More Information?
Contact our expert team today, whether you need more information, specific consultations, or immediate issue resolution, we are ready to assist you with just one click.
Greenwill Solution is ready to help you achieve your technology goals efficiently and securely.
bottom of page