The Italian Data Protection Authority has ordered, with immediate effect, the temporary restriction of the processing of Italian users’ dataagainst OpenAI, the U.S.-based company that developed and operates the platform. At the same time, the Authority opened an investigation.ChatGPT, the best-known relational artificial intelligence software capable of simulating and processing human conversations, had suffered a […]
Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. With this ubiquity and power comes the potential for abuse. Insider threats offer some of the most potentials for destruction. Many internal users have over-provisioned access and visibility into the internal network. Insiders’ level of access and trust in a network […]
Fake recruiters on LinkedIn earn a victim’s trust, and then convinces them to engage on WhatsApp or by email, where they can send a malware dropper according to Mandiant.
Did you know that your Ring doorbell video footage could be part of police surveillance? Ring saw search warrants increase 33 percent in 2022 from the previous year. The lack of legal controls on what police can ask for, and judges failing to properly scrutinize these warrants, opens the door for even indoor home footage […]
In a recent report Cyberhaven detected and blocked requests to input data into ChatGPT from 4.2% of the 1.6 million workers at its client companies because of the risk of leaking confidential information, client data, source code, or regulated information to the ChatGPT. In one case, an executive cut and pasted the firm’s 2023 strategy document into […]
Almost half of all Dutch company websites are vulnerable to attacks by cyber criminals due to vulnerabilities in software, configurations and web services. The result is often data theft or extortion through ransomware. “Entrepreneurs are insufficiently aware of the risks,” says cybersecurity specialist ID Control based on three studies of web shops, government websites and […]
How did the crooks get in given that the needed access credentials of 4 developers at LastPass were locked up in a secure password vault to which only they had access? Access to the vault password was accomplished by targeting the DevOps engineer’s home computer and exploiting a vulnerable third-party media software package, which enabled […]
The Bundesamt für Sicherheit in der Informationstechnik (BSI), part of the German Ministry of Internal Affairs, has investigated web shops which show that they are often unsafe. Seven out of ten researched webshop platforms use vulnerable JavaScript libraries. In addition, almost all solutions had inadequate password policies and nearly half of the products use end-of-life […]
The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs has recommended states that the executive order is too vague, and leaves US courts — who would be the sole interpreters of the proposed EU-US Data Privacy Framework — wiggle room to approve the bulk collection of data for signals intelligence, and doesn’t apply […]
The ChatGPT tool is a language model based on the GPT-3.5 architecture and trained by OpenAI. It uses a web crawler to collect data and generate responses to user input. While this technology has many useful applications, it also raises concerns about the potential misuse of proprietary information. One way that the ChatGPT tool collects […]

