ChatGPT
From ChatBot To SpyBot: ChatGPT Post Exploitation
In the second installment of our blog post series on ChatGPT, we delve deeper into the security implications that come with the integration of AI into our daily routines. Building on the ...
ChatGPT Plugin Security Vulnerabilities Exploited By Hackers
In the realm of cybersecurity, constant vigilance is paramount as threat actors perpetually seek novel ways to exploit vulnerabilities. Recent research has shed light on a concerning trend: the potential misuse of ...
Beware of OpenAI and ChatGPT-4 Turbo in Healthcare Orgs’ API Attack Surface
With every new healthcare API integration that OpenAI gets access to, the attack surface grows, creating new opportunities for attackers ...
Cybersecurity Insights with Contrast CISO David Lindner | 3/1/24
Insight #1 As was made clear by the recent blowup over Google’s Gemini image creation tool last week (it generated “embarrassing and offensive results,” as one publication put it), AI is proving ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24
Insight #1 The post quantum encryption era is upon us, and Apple is leading the charge to protect against future quantum computing attacks by boosting security on its iMessage platform, adding a ...
XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT
With its widespread use among businesses and individual users, ChatGPT is a prime target for attackers looking to access sensitive information. In this blog post, I’ll walk you through my discovery of ...
The AI Supply Chain Is Not Impervious
AI was the leading story of 2023 – to provide some context, ChatGPT became Wikipedia’s most viewed article of 2023 – and it has been implemented in testing or production stages by ...
OpenAI: We’ll Stop GPT Misuse for Election Misinfo
Guardrails Prevent Trouble? Sam says avoid AI abuse—protect the democratic process ...
A Robot the Size of the World
In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats. It had actuators: ...
Why Cybersecurity Needs To Be an SMB Priority
SMBs are low-hanging fruit for cybercriminals because they have limited IT resources, staff and cybersecurity defenses ...