Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
ChatGPT Shared Links and Information Protection: Risks and Measures Organisations Must Understand
Privacy & Risks

ChatGPT Shared Links and Information Protection: Risks and Measures Organisations Must Understand

Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organisations and individual users. However, its latest feature, known as Shared Links, comes with the potential risk of unintentional disclosure of confidential information.

July 05, 2023
Compliance & Risks

Trend Vision One Integrates Microsoft Defender for Endpoint

Discover how Trend Vision One integrates with Microsoft Defender for Endpoint to unify visibility, close security gaps, and accelerate risk mitigation - maximising protection without replacing existing tools.

Security Strategies Aug 26, 2025

Save to Folio

Security Strategies Aug 26, 2025

Save to Folio

Ransomware

Warlock: From SharePoint Vulnerability Exploit to Enterprise Ransomware

Warlock ransomware exploits unpatched Microsoft SharePoint vulnerabilities to gain access, escalate privileges, steal credentials, move laterally, and deploy ransomware with data exfiltration across enterprise environments.

Research Aug 20, 2025

Save to Folio

Research Aug 20, 2025

Save to Folio

Ransomware

Gunra Ransomware Group Unveils Efficient Linux Variant

This blog discusses how Gunra ransomware’s new Linux variant accelerates and customises encryption, expanding the group’s reach with advanced cross-platform tactics.

Latest News Jul 29, 2025

Save to Folio

Latest News Jul 29, 2025

Save to Folio

Privacy & Risks

Unlocking the Power of Amazon Security Lake for Proactive Security

Security is a central challenge in modern application development and maintenance, requiring not just traditional practises but also a deep understanding of application architecture and data flow. While organisations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence.

How To Jul 28, 2025

Save to Folio

How To Jul 28, 2025

Save to Folio

APT & Targeted Attacks

Revisiting UNC3886 Tactics to Defend Against Present Risk

We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defences against the ongoing and emerging threats of this APT group.

Jul 28, 2025

Save to Folio

Jul 28, 2025

Save to Folio