Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
ChatGPT Shared Links and Information Protection: Risks and Measures Organisations Must Understand
Privacy & Risks

ChatGPT Shared Links and Information Protection: Risks and Measures Organisations Must Understand

Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organisations and individual users. However, its latest feature, known as Shared Links, comes with the potential risk of unintentional disclosure of confidential information.

July 05, 2023
Ransomware

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments.

Research Aug 20, 2025

Save to Folio

Research Aug 20, 2025

Save to Folio

Ransomware

Gunra Ransomware Group Unveils Efficient Linux Variant

This blog discusses how Gunra ransomware’s new Linux variant accelerates and customises encryption, expanding the group’s reach with advanced cross-platform tactics.

Latest News Jul 29, 2025

Save to Folio

Latest News Jul 29, 2025

Save to Folio

Privacy & Risks

Unlocking the Power of Amazon Security Lake for Proactive Security

Security is a central challenge in modern application development and maintenance, requiring not just traditional practises but also a deep understanding of application architecture and data flow. While organisations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence.

How To Jul 28, 2025

Save to Folio

How To Jul 28, 2025

Save to Folio

APT & Targeted Attacks

Revisiting UNC3886 Tactics to Defend Against Present Risk

We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defences against the ongoing and emerging threats of this APT group.

Jul 28, 2025

Save to Folio

Jul 28, 2025

Save to Folio

Artificial Intelligence (AI)

Proactive Email Security: The Power of AI

Lead with AI-powered email security to stay ahead of attackers and personalise user interaction at every touchpoint, bridging technology and behaviour with precision.

Research Jul 24, 2025

Save to Folio

Research Jul 24, 2025

Save to Folio

Malware

Back to Business: Lumma Stealer Returns with Stealthier Methods

Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat.

Research Jul 22, 2025

Save to Folio

Research Jul 22, 2025

Save to Folio