Friday , December 27 2024

ExtraHop Releases New Tool to Defend Against ChatGPT Data Leaks

In response to the increasing prevalence of ChatGPT and the associated risks of data leaks, ExtraHop has launched Reveal(x), a cutting-edge solution that offers organizations visibility into their network devices and users connecting to OpenAI domains.

The popularity of ChatGPT has skyrocketed, with 1 billion customers reached in a mere 2 months, surpassing the growth rate of platforms like TikTok, which took eight years to achieve the same milestone.

Hacker reportedly leak Indonesia Gov.t 82 GB data

Hackers claimed to have accessed and stolen 82 GB of sensitive data from Indonesia's Regional Financial Management Information System (SIPKD)....
Read More
Hacker reportedly leak Indonesia Gov.t 82 GB data

BCSI officially announce National Vulnerability Disclosure Program (NVDP)

Bangladesh Cyber Security Intelligence (BCSI) officially launch the National Vulnerability Disclosure Program (NVDP) to enhance the country's cybersecurity. This initiative...
Read More
BCSI officially announce National Vulnerability Disclosure Program (NVDP)

CVE-2024-9474
Researcher unveil sophisticated backdoor in Palo Alto Networks firewalls

Northwave Cyber Security has found a sophisticated backdoor, LITTLELAMB.WOOLTEA, targeting Palo Alto Networks firewalls. Northwave researcher claimed the backdoor was...
Read More
CVE-2024-9474  Researcher unveil sophisticated backdoor in Palo Alto Networks firewalls

New G-Door Vul Allow Hackers Bypass Microsoft 365 Security With Google Docs

A newly discovered vulnerability called "G-Door" enables malicious actors to bypass Microsoft 365 security by exploiting unmanaged Google Docs accounts....
Read More
New G-Door Vul Allow Hackers Bypass Microsoft 365 Security With Google Docs

CVE-2024-53961
Adobe alerts of critical ColdFusion bug with PoC exploit available

Adobe has issued urgent security updates for ColdFusion versions 2023 and 2021 to fix a critical vulnerability (CVE-2024-53961). This flaw...
Read More
CVE-2024-53961  Adobe alerts of critical ColdFusion bug with PoC exploit available

Splunk targets Bangladeshi market: Investing in local talent

Splunk, a unified security and observability platform turn its focuses on Bangladeshi market. On Monday (23 December) Splunk's local partner...
Read More
Splunk targets Bangladeshi market: Investing in local talent

Critical PHP Zero-Day Vulnerability found in Craft CMS To Gain RCE

A major security flaw in Craft CMS, a popular PHP content management system, has been found, enabling unauthenticated remote code...
Read More
Critical PHP Zero-Day Vulnerability found in Craft CMS To Gain RCE

For US$2.6bn, Mastercard acquires threat intelligence firm Recorded Future

Mastercard has completed its acquisition of Recorded Future, an AI-based threat intelligence provider. Mastercard has acquired the company for $2.65...
Read More
For US$2.6bn, Mastercard acquires threat intelligence firm Recorded Future

Eight New ICS Advisories released by CISA

CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Read More
Eight New ICS Advisories released by CISA

Authority Denies
Hacker claim ransomware attack on Indonesia’s state bank BRI

Bank Rakyat Indonesia (BRI), the largest state bank by assets, has assured customers that their data and funds are secure...
Read More
Authority Denies  Hacker claim ransomware attack on Indonesia’s state bank BRI

A recent survey conducted by Gartner in 2023 revealed that 9 out of 10 respondents plan to implement ChatGPT within their organizations by 2025, showcasing its widespread adoption.

While ChatGPT has the potential to accelerate organizational progress, deploying AI-as-a-Service (AIaaS) tools within organizations also introduces Intellectual Property risks.

Numerous instances of data leaks associated with ChatGPT have been reported, particularly when users share proprietary information during code reviews, research, or any form of discovery. The confidential data becomes vulnerable as ChatGPT stores it in public domains and utilizes the information to respond to other user queries.

Reveal(x) emerges as the solution to safeguard against these risks, empowering organizations to gain visibility into the devices and users connected to OpenAI domains within their networks. This enables organizations to exercise greater control over their data when implementing AI language models and generative AI tools.

This information becomes pivotal for organizations to assess the volume of data transmitted to OpenAI domains and evaluate the associated risks of utilizing AI services. Security personnel can then validate acceptable risk thresholds and minimize potential Intellectual Property losses.

Technical Analysis

Reveal(x) leverages network packets as its primary data source for real-time detection and monitoring. By stripping the content and payload sent from OSI layers 2-7 (DataLink Layer to Application Layer), it provides comprehensive data visibility.

While rules, regulations, and policies surrounding data storage and usage by AI exist, it remains crucial for organizations to understand the intricacies of utilizing these services effectively.

ExtraHop emphasizes that despite the data exposure risks, the productivity benefits of AI tools outweigh them. However, organizations must possess a clear understanding of how their data will be used, including data retention periods, and implement robust policies governing the usage of these services. Tools like Reveal(x) are instrumental in assessing policy compliance and identifying risks in real-time.

The full extent of an AI’s capabilities and the associated data exposure risks remain uncertain, emphasizing the need for organizations to remain vigilant in protecting their data assets.

Check Also

AI

AI-made nude images incident, one school, 50 female victim

Nearly half of the high school’s female students were victimized in AI based deepfake the …

Leave a Reply

Your email address will not be published. Required fields are marked *