Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ChatGPT security risks: defending against chatbots

AI chatbots such as OpenAI’s ChatGPT, Anthropic’s Claude, Meta AI and Google Gemini have already demonstrated their transformative potential for businesses, but they also present novel security threats that organisations can’t afford to ignore. In this blog post, we dig deep into ChatGPT security, outline how chatbots are being used to execute low sophistication attacks, phishing campaigns and other malicious activity, and share some key recommendations to help safeguard your business.

Kerberos Ticket and Authentication in Active Directory

Many ask, what is Kerberos? Kerberos is an authentication protocol. It is designed for client-server applications and requires mutual verification. It is the default protocol used for logging into a Windows machine that is part of a domain, relies on a secure communication channel between the client and the Domain Controller (DC). Windows updates address security concerns such as vulnerabilities in this channel, ensuring that the user database stored on the DC is protected.

Understanding Website Vulnerabilities: Exploitation and Prevention

A website vulnerability refers to a weakness or misconfiguration in the design, implementation, or operation of a website that can be exploited by attackers to compromise its integrity, availability, or confidentiality. These vulnerabilities can exist in various components of a website, including its code, server configuration, database, and third-party plugins or extensions.

Ensure LAPS AdmPwd GPO Extension / CSE is installed

The Windows Local Administrator Password Solution ( Windows LAPS) is a built-in Windows feature designed to seamlessly handle and safeguard the password for a local administrator account on devices joined to either Microsoft Enterprise or Windows Server Active Directory domains. Additionally, Windows LAPS can be utilized to automatically manage and secure the Directory Services Restore Mode (DSRM) account password on Windows Server Active Directory domain controllers.

Tips and Best Practices to Secure Active Directory: Audit and Privileged Access Management

Active Directory (AD) is a useful service that helps organizations manage identities and control access to network resources, thus improving corporate cybersecurity. However, when poorly managed, AD can be exploited in a way that could harm an organization’s sensitive assets and operational resilience. In this article, we briefly define what Active Directory is, list its main services, and discuss possible threats.

The Top 10 Manufacturing Industry Cyber Attacks

It’s no secret that the manufacturing industry has found themselves in the crosshairs of threat actors in recent years. With a low tolerance for downtime, international operational footprints, and servers full of valuable information, these organizations represent riches for ransomware gangs and individual hackers alike.

How to Prioritize Vulnerabilities with Checkmarx and Sysdig Runtime Insights

Back in August 2023, Checkmarx and Sysdig announced a new partnership. This collaboration enables customers of both Checkmarx and Sysdig to leverage the comprehensive visibility offered by Sysdig Runtime Insights to get even more value from the Checkmarx One application security platform.

The Latest Tech Won't Save You: Why Cybersecurity Needs More Than Tools

Recently, Computer Weekly released an article entitled “Budgets Rise As IT Decision Makers Ramp Up Cybersecurity Spending” on 18th March 2024. It was an interesting article as it cited a number of stats that showed that IT departments plan to increase their cybersecurity budget and that globally 65% of organisations were going to spend more on cybersecurity.

Kill Ransomware: A New Entrant Strikes, Breaching Kerala Police and Beyond

In the ever-evolving landscape of cybersecurity threats, new players emerge with alarming frequency, and the latest to make waves is "Kill Ransomware." With a formation date in 2023, this group wasted no time in announcing its presence on the dark web, enticing skilled hackers to join its ranks. Leveraging sophisticated tactics, Kill Ransomware has swiftly executed four notable breaches, sending shockwaves through the digital realm.