article thumbnail

When ChatGPT Goes Phishing

Security Boulevard

ChatGPT has become a powerful tool for security professionals seeking to enrich their work. However, its widespread use has raised concerns about the potential for bad actors to misuse the technology. The post When ChatGPT Goes Phishing appeared first on Security Boulevard.

Phishing 130
article thumbnail

AI in cybersecurity: The good, the bad, and the ugly

Security Boulevard

However, as with any technology, there are also risks associated with the use of AI in cybersecurity. Artificial intelligence (AI) is rapidly becoming a powerful tool in the cybersecurity landscape, with the potential to revolutionize the way we detect and respond to cyber threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ZINC Hackers Leverage Open-source Software to Lure IT Pros

eSecurity Planet

ZINC, a sub-group of the notorious North Korean Lazarus hacking group, has implanted malicious payloads in open-source software to infiltrate corporate networks, Microsoft’s threat hunting team has reported. See the Best Open Source Security Tools. UK, and India. Highly Evasive Attack. Also read: How Hackers Evade Detection.

Software 128
article thumbnail

Rombertik: Old Dog

Doctor Chaos

Rombertik attacks are based on social engineering, tricking users into downloading the executable program which is disguised as a PDF file. Rombertik has a number of obfuscation and evasion technologies that make it difficult to debug. Is that an over-simplified solution?

article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Mitnick and KnowBe4 As an early expert in social engineering and hacking, Mitnick provided valuable first-hand knowledge when he joined KnowBe4. He helped design KnowBe4’s training based on his social engineering tactics, and he became a partial owner of KnowBe4 in November 2011.

article thumbnail

Most Common Causes of Data Breach and How to Prevent It

Security Affairs

Physical Actions Lead to Data Breaches A small percentage of all the data breach incidents occur because of physical actions that don’t involve technology. Social Engineering It’s been found that almost one-fourth of the data breach is carried out by using social engineering. One common.

article thumbnail

New AI Threats Emerge as FraudGPT Creator Unleashes DarkBERT and DarkBART

eSecurity Planet

In his blog post , Kelley shared a video from CanadianKingpin12 that suggests DarkBERT will go well beyond the social engineering capabilities of the earlier tools with new “concerning capabilities.”