Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts115/v4/fe/d9/af/fed9afcb-336e-b076-3984-18fe016897c8/mza_10167470921854195622.jpg/600x600bb.jpg
The Gate 15 Podcast Channel
Gate 15
337 episodes
3 days ago
The Gate 15 Company is a leader in helping organizations by providing threat-informed, risk-based approaches to analysis, preparedness and operations.
Show more...
Government
RSS
All content for The Gate 15 Podcast Channel is the property of Gate 15 and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Gate 15 Company is a leader in helping organizations by providing threat-informed, risk-based approaches to analysis, preparedness and operations.
Show more...
Government
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/2792650/2792650-1760484611759-8c437324d3b1f.jpg
Weekly Security Sprint EP 131. Threat use of AI, ransomware reports and cyber insurance, weather, protests, and more
The Gate 15 Podcast Channel
22 minutes 53 seconds
1 month ago
Weekly Security Sprint EP 131. Threat use of AI, ransomware reports and cyber insurance, weather, protests, and more

In this week's Security Sprint, Dave and Andy covered the following topics:


Main Topics:

Russia, China and North Korea are using ChatGPT to influence you — here’s how. A new report from OpenAI found foreign adversaries are increasingly using artificial intelligence to power hacking and influencing operations. The report found they were using OpenAI’s popular tool ChatGPT. The report showed those adversaries include Russia, China and North Korea. “AI-enabled attacks are becoming more capable and harder to detect,” Daryl Lim, affiliate at the Center for Socially Responsible Artificial Intelligence at Penn State University, told Straight Arrow News. “Adversaries can personalize attacks, evade filters and iterate faster than before.”

• The Case for AI Loss of Control Response Planning and an Outline to Get Started

• Can Humans Devise Practical Safeguards That Are Reliable Against an Artificial Superintelligent Agent?


The true cost of cyber attacks - and the business weak spots that allow them to happen. What makes companies like Jaguar Land Rover and Marks & Spencer particularly vulnerable is the way in which their supply chains work.

• UK NCSC: UK experiencing four 'nationally significant' cyber attacks every week

• Cyber attack contingency plans should be put on paper, firms told

• Policyholder Plot Twist: Cyber Insurer Sues Policyholder’s Cyber Pros

• The Ransomware Pricing Paradox: An Empirical Study of the Six Stages of Ransomware Negotiations. PDF

• Paying off cyber criminals no guarantee stolen data won’t be published – study


Severe Weather: Hurricane Season continues


18 Oct: No Kings nationwide protests


Quick Hits:

• Peace in Israel and Gaza?

• Sen. Peters tries another approach to extend expired cyber threat information-sharing law & Peters & Rounds Introduce Bipartisan Bill to Restore Critical Cybersecurity Protections

• Yet another shutdown and its impact on cybersecurity professionals

• Experts: Shutdown Strains Healthcare Cyber Defenses

• Is the government shutdown impacting info sharing for healthcare cyber threats?

• ICYMI! Gate 15 Weekly Security Sprint EP 130. The Evangelist has returned! Cybersecurity Awareness Month and more!

• Poland says cyberattacks on critical infrastructure rising, blames Russia

• Anatomy of a Hacktivist Attack: Russian-Aligned Group Targets OT/ICS

• Critical networks face unprecedented threat as DDoS attacks are getting shorter and more intense

• Belgian PM reported to be among targets of ‘jihad-inspired’ drone plot

• Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign




The Gate 15 Podcast Channel
The Gate 15 Company is a leader in helping organizations by providing threat-informed, risk-based approaches to analysis, preparedness and operations.