Skip to content
May 9, 2025
  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.

The Cyber Hound Tech Security Blog!

My Journey into Hacking and Cybersecurity!

  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.
Watch Online
  • Home
  • Journey into CyberSec
  • MIT xPro Class Assignment of “Research current Cybersecurity events..
  • Journey into CyberSec

MIT xPro Class Assignment of “Research current Cybersecurity events..

George December 13, 2022

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Facebook (Opens in new window) Facebook

Thanks to the simplycyber community along with Gerald Auger, Jax Scott, Eric Taylor, and BHIS who opened my eyes to this new threat.

12/12/22

For many in IT, I always try to innovate and stay on top of the latest trends. My current and future roles I hope will provide me with the continuation of learning. I can’t remember who said that “In CyberSecurity, you will have to be a lifetime learner”.  Besides my love of Tech Toys, I love to learn, innovate and continue to grow. 

Thus today I want to present a new threat to everyone’s eyes, if it wasn’t for the Cyber podcasts of SymplyCyber, Black Hils Info Security, and many others, I too would have missed this new and emerging threat.

“In general, cybersecurity incidents can take many forms, such as data breaches, ransomware attacks, and phishing scams. These incidents can have various impacts, including the theft or loss of sensitive data, disruption of services, and financial losses. The perpetrators of such incidents can be individuals, organized groups, or even nation-states.

To protect against cybersecurity incidents, individuals and organizations can take a number of steps, such as regularly updating their software and using strong passwords. They can also use security tools such as antivirus software and firewalls to detect and prevent attacks. In addition, it is important to be aware of potential threats and to be cautious when sharing sensitive information online.

Overall, cybersecurity is a growing concern in today’s digital age, and it is important for individuals and organizations to take steps to protect themselves against potential incidents. While there is no foolproof way to prevent such incidents, being proactive and using best practices can help to minimize the risks.”

Why is the above paragraph In quotes you ask, well these statements were not written by me, nor were they written by a human being? Let me introduce you to OpenAI ChatGPT. (ChatGPT: Optimizing Language Models for Dialogue (openai.com) (Links to an external site.))

The opening paragraph reads “Recently, there have been many cybersecurity incidents that have made headlines, but I am unable to provide specific details because I am a large language model trained by OpenAI and I do not have access to the internet or current news. As a language model, my knowledge is limited to the text that I have been trained on, which has a fixed cutoff point in 2021. ” 

When I first started hearing about OpenAI Chat GPT, I was a bit excited about and new software to help me in my daily life. I,  who struggles with term papers, and written text, could see the advantages of AI. I rely heavily on tools like Grammarly, to proofread my work. My brain will read what it wanted to write, and not what is actually written. During active incidents, I have sent out emails that no one could understand, I have actually taken the approach of verbally asking someone to send out the alert and allow me to fix this issue and then write the follow-up. Having access to ChatGPT would allow me to send out an email in a few seconds that anyone could understand. 

Myself, I followed the stories and started hearing people using ChatGPT to write their term papers, then the researchers (and threat actors) started asking Open Ai to write convincing phishing emails and text. Then just the other started asking for it to write code, ransomware code. SC Media ” How ChatGPT is changing the way cybersecurity practitioners look at the potential of AI”  (Links to an external site.)At least one researcher was able to get ChatGPT to write an overflow buffer exploit. This is a brand new threat to our end users, our system, and our data. The days of script kiddies are about to explode. Starting at about 2 dollars threat actors have pools of Corporate Emails access with automated systems to sell you creds on the dark web. Bleeping Computer.  (Links to an external site.)Today with a few dollars, basic web skills, and some time on your hands you to, can breach the human factor of Computers. The damage I feel is yet to be seen in this new war of the White and Gray hats vs the world. 

I took this assignment to heart, I might have stretched the objective a bit, however, I feel that asking someone who is actively pursuing CyberSecuity, to write about any past incident wasn’t going to be good enough for me. The past is a great learning tool, and I have done a number of postmortems in my work. However, I needed to present this new and emerging threat when I heard about ChatGPT. Again this morning on how people are using it to exploit it. This threat is new, it’s basically a little know Zero Day that is in the wild now. The damage and impact aren’t unknown or not yet happing. The full extent of the damage is yet known.  This is ransomware, this is phishing, this is actual exploiting of users. Every single day CISO, NIST, and others are full of stories and impact reports of these types of threats and the damage done. Just like crypto real humans are losing money and sometimes everything they have. The damage to all is real, the threat is real, and the time to be defensive is now. 

The impact is money, the impact is stolen identity, and the impact is unprecedented.  

Lastly, I recently it wouldn’t be right for me to not bring this up, in a number of countries, what we consider cybercrime is just a business model, to some it’s a way to feed their families, it’s a way out of poverty. Are they threat actors playing the game or are they trying to survive, personally we need to learn more about them and their lives. Thus for us the defenders we have to get inside the minds of our counterparts. (I think this was the Art of War) 

Best to all. I can’t wait to continue this topic.. I do post my thoughts at my blog @ cyberhound.tech

George S 

Like this:

Like Loading...

Related

Continue Reading

Previous: From IT Hobby to Cybersecurity Career: My Journey and Mentors
Next: Class Discussion – Q1, discuss a security goal and identify a threat model.

Related Stories

Critical Tips to Safeguard Against Online Scams and Extortion
  • Journey into CyberSec

Critical Tips to Safeguard Against Online Scams and Extortion

August 5, 2024
The Importance of Multi-Factor Authentication (MFA) erson using a mobile authentication app on their smartphone with a secure lock icon overlay. In the background, a computer screen shows multiple login attempts being blocked. The setting is a modern home office with a clean, professional look, emphasizing security and protection.
  • Gear Insight and reviews
  • Journey into CyberSec

The Importance of Multi-Factor Authentication (MFA)

July 8, 2024
Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks
  • Journey into CyberSec

Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks

April 15, 2024

Thanks for the visit!

Welcome to My Blog! This is a work in  progress. Each week, I hope to explore the world of CyberSecurity, and All Things IT.

I am a 4X year old IT professional with a few different learning disabilities that I struggle with! I am here to create a safe place for all, with my insight of what worked for me and what hasn’t. My goals are to move more into a security focused role.

Please keep me honest and let me know what you think. I struggle with writing, and spelling. My hope with this blog is to get better with both, I relay heavily on tools like Grammarly (paid) and Yoast SEO (free) for grammar, writing and spelling. No tool is perfect and honestly neither am I!

Please let me know how you page to this page in the comments on Twitter.  I really am learning and trying to write better.

Again welcome to my blog, join me as I start a deep dive in to all things CyberSecurity!

Trust Your Technolust!

You may have missed

Critical Tips to Safeguard Against Online Scams and Extortion
  • Journey into CyberSec

Critical Tips to Safeguard Against Online Scams and Extortion

August 5, 2024
The Importance of Multi-Factor Authentication (MFA) erson using a mobile authentication app on their smartphone with a secure lock icon overlay. In the background, a computer screen shows multiple login attempts being blocked. The setting is a modern home office with a clean, professional look, emphasizing security and protection.
  • Gear Insight and reviews
  • Journey into CyberSec

The Importance of Multi-Factor Authentication (MFA)

July 8, 2024
Understanding the US Government’s Ban on Kaspersky Software: Implications for Cybersecurity
  • My Thoughts

Understanding the US Government’s Ban on Kaspersky Software: Implications for Cybersecurity

June 24, 2024
Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks
  • Journey into CyberSec

Protecting Healthcare: How to Combat Hackers Targeting IT Help Desks

April 15, 2024
  • Blog Ideas & Topics - The List.
  • My Gear
  • Staying Safe OnLine
  • Welcome - Start Here
    • About Me - The Early Years.
  • Welcome – Start Here
  • Staying Safe OnLine
  • My Gear
  • About Me – The Early Years.
  • Blog Ideas & Topics – The List.
Copyright © All rights reserved. | DarkNews by AF themes.
%d