Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI on offense: Can ChatGPT be used for cyberattacks?

Generative AI models have a long history in artificial intelligence (AI). It all started back in the 1950s with Hidden Markov Models and Gaussian Mixture Models, and it really evolved with the advent of Deep Learning. In the past five years alone, we have gone from models with several millions of parameters to the latest being GPT-4, estimated to have over 100 trillion parameters.

ChatGPT and Cato: Get Fish, Not Tackles

ChatGPT is all the rage these days. Its ability to magically produce coherent and typically well-written, essay-length answers to (almost) any question is simply mind-blowing. Like any marketing department on the planet, we wanted to “latch onto the news.” How can we connect Cato and ChatGPT? Our head of demand generation, Merav Keren, made an interesting comparison between ChatGPT and Google Search.

Greatest Threats to Businesses Today: Insights by ChatGPT

Discover the prevailing threats that pose a constant challenge to businesses in today's ever-evolving world. Join ChatGPT as we explore the diverse array of threats faced by businesses and uncover the most significant among them. While the nature of the threat may differ based on factors such as industry and business size, several common threats prevail across the board. Cybersecurity threats, including hacking, malware, and ransomware attacks, have reached unprecedented levels of sophistication, constituting a substantial menace to businesses.

ChatGPT Reveals Top 5 Cybersecurity Concerns for Businesses

Welcome to a special edition of Razorwire, where I had the pleasure of interviewing AI language model, ChatGPT. Our discussion revolved around various topics related to information security and cybersecurity. ChatGPT shared valuable insights on how AI can assist in securing organisations against cyber attacks but also emphasised that it should be considered just one tool in a broader cybersecurity strategy. We delved into the future of cybersecurity, key technologies for a defence in depth approach, and the advantages of continuous penetration testing.

Salt Labs exposes a new vulnerability in popular OAuth framework, used in hundreds of online services

This post is the second in a series describing OAuth implementation issues that put companies at risk. We create these posts to share rich technical details, drawn from real-world use cases, to educate the broader industry on the nature of these errors, their potential impact, and how to avoid them to better protect API ecosystems.

Teleport Assist - GPT-4 powered DevOps assistant.

Introducing Teleport's new GPT-4 powered DevOps assistant, Teleport Assist. Leveraging the foundation of Teleport's Open Infrastructure Access Platform, with its complete inventory of your infrastructure, Teleport Assist utilizes facts about your infrastructure to help answer questions, generate command line scripts, and help you perform routine tasks on target nodes.

Unlocking the Secrets of Spanish Slang: A Closer Look at Cybersecurity Lingo

Spain has one of the biggest cybersecurity markets in Europe. By the end of 2023, it's estimated to be worth more than $2.4 billion. There's a good reason for this. According to recent reports by ESET, Spanish users are particularly at risk from remote desktop attacks. In a single fourth-month period alone, Span suffered more than 50 billion remote desktop attacks. While this comes as a real concern for computer users, the growing trend of cyber attacks presents lucrative career prospects. From entry-level penetration testers to senior security analyst roles, there are plenty of rewarding roles out there.

CrowdStrike Advances the Use of AI to Predict Adversary Behavior and Significantly Improve Protection

Since CrowdStrike’s founding in 2011, we have pioneered the use of artificial intelligence (AI) and machine learning (ML) in cybersecurity to solve our customers’ most pressing challenges. Our application of AI has fit into three practical categories.