Vectors of approach

From ChatBot To SpyBot: ChatGPT Post Exploitation

In the second installment of our blog post series on ChatGPT, we delve deeper into the security implications that come with the integration of AI into our daily routines. Building on the ...

ChatGPT Plugin Security Vulnerabilities Exploited By Hackers

In the realm of cybersecurity, constant vigilance is paramount as threat actors perpetually seek novel ways to exploit vulnerabilities. Recent research has shed light on a concerning trend: the potential misuse of ...
API, ChatGPT, exfiltration API security Salt Security APIs social media

Beware of OpenAI and ChatGPT-4 Turbo in Healthcare Orgs’ API Attack Surface

With every new healthcare API integration that OpenAI gets access to, the attack surface grows, creating new opportunities for attackers ...
Security Boulevard
Cybersecurity Insights with Contrast CISO David Lindner | 3/1/24

Cybersecurity Insights with Contrast CISO David Lindner | 3/1/24

Insight #1 As was made clear by the recent blowup over Google’s Gemini image creation tool last week (it generated “embarrassing and offensive results,” as one publication put it), AI is proving ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Insight #1 The post quantum encryption era is upon us, and Apple is leading the charge to protect against future quantum computing attacks by boosting security on its iMessage platform, adding a ...
XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT

XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT

With its widespread use among businesses and individual users, ChatGPT is a prime target for attackers looking to access sensitive information. In this blog post, I’ll walk you through my discovery of ...

The AI Supply Chain Is Not Impervious

AI was the leading story of 2023 – to provide some context, ChatGPT became Wikipedia’s most viewed article of 2023 – and it has been implemented in testing or production stages by ...

A Robot the Size of the World

In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats. It had actuators: ...
SMBs, threats, shutdown SMBs cybercriminals business ransomware malware Kaseya 6 Ways Poor Cybersecurity Hurts Businesses

Why Cybersecurity Needs To Be an SMB Priority

SMBs are low-hanging fruit for cybercriminals because they have limited IT resources, staff and cybersecurity defenses ...
Security Boulevard