• About
  • Privacy Policy
  • Careers
  • Manage Subscriptions
Friday, September 22, 2023
TechEconomy
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Phones
      • Gadgets and Appliances
      • Accessories
      • Laptop
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Partners
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Phones
      • Gadgets and Appliances
      • Accessories
      • Laptop
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Partners
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
Techeconomy
No Result
View All Result

Home » How ChatGPT will Influence Cybersecurity

How ChatGPT will Influence Cybersecurity

Techeconomy by Techeconomy
January 28, 2023
in Security
0
ChatGPT and Cybersecurity
Source: LinkedIn

Source: LinkedIn

Sifax
Advertisements

Kaspersky is exploring how the appearance of ChatGPT in the hands of the general public could change the established rules of the cybersecurity world.

The move comes a few months after OpenAI released ChatGPT3 – one of the most powerful AI models to date. ChatGPT-3 can explain complex scientific concepts better than many teachers, write music and generate almost any text based on the user’s request.

RelatedPosts

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

September 21, 2023

Boosting Collaboration and Strengthening Security with UC in the Financial Services Sector

September 20, 2023

ChatGPT-3 is primarily an AI language model that creates convincing texts which are difficult to distinguish from those written by humans. Hence, cybercriminals are already trying to apply this technology to spear-phishing attacks.

Previously, the main hurdle stopping them from mass spear-phishing campaigns was that it is quite expensive to write each targeted email.

ALSO READ: ChatGPT; Revolutionary Chatbot … By Oluseyi Akindeinde

ChatGPT is set to drastically alter the balance of power, because it might allow attackers to generate persuasive and personalised phishing e-mails on an industrial scale. It can even stylise correspondence, creating convincing fake e-mails seemingly from one employee to another. Unfortunately, this means that the number of successful phishing attacks may grow.

The generated phishing letter by ChatGPT
| The generated phishing letter by ChatGPT

Many users have already found that ChatGPT is capable of generating code, but unfortunately this includes the malicious type. Creating a simple infostealer will be possible without having any programming skills at all.

However, straight-arrow users have nothing to fear. If code written by a bot is actually used, security solutions will detect and neutralise it as quickly as it does with all past malware created by humans. While some analysts voice concern that ChatGPT can even create unique malware for each particular victim, these samples would still exhibit malicious behaviour that most probably will be noticed by a security solution.

What’s more, the bot-written malware is likely to contain subtle errors and logical flaws which means that full automation of malware coding is yet to achieve.

Although the tool may be useful to attackers, defenders can also benefit from it. For instance, ChatGPT is already capable of quickly explaining what a particular piece of code does.

It comes into its own in SOC conditions, where constantly overworked analysts have to devote a minimum amount of time to each incident, so any tool to speed up the process is welcome.

In the future, users will probably see numerous specialised products: a reverse-engineering model to understand code better, a CTF-solving model, a vulnerability research model, and more.

“While ChatGPT doesn’t do anything outright malicious, it might help attackers in a variety of scenarios, for example, writing convincing targeted phishing emails. However, at the moment, ChatGPT definitely isn’t capable of becoming some sort of autonomous hacking AI.

The malicious code that the neural network generates will not necessarily be working at all and would still require a skilled specialist to improve and deploy it. Though ChatGPT doesn’t have an immediate impact on industry and doesn’t change the cybersecurity game, the next generations of AI probably will.

In the next few years, we may see how large language models, both trained on natural language and programming code, are adapted for specialised use-cases in cybersecurity.

These changes can affect a wide range of cybersecurity activities, from threat-hunting to incident response. Therefore, cybersecurity companies will want to explore the possibilities that new tools will give, while also being aware of how this tech might aid cybercriminals,” comments Vladislav Tushkanov, a security expert at Kaspersky.

Advertisements
innovation
AIT
Advertisements
Tags: ChatGPT
ShareTweetSend
Previous Post

Five Deep Tech Trends to Watch from South African Entrepreneurs

Next Post

IoT Device Management Market to hit US$11 Bn by 2028

Techeconomy

Techeconomy

Related Posts

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update
Security

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

by Joan Aimuengheuwa
September 21, 2023
0

At the core of this rebranding is a renewed sense of purpose and energy to enhance user privacy and protect...

Read more
UC solution and Security (Photo: GettyImages)

Boosting Collaboration and Strengthening Security with UC in the Financial Services Sector

September 20, 2023
Sha Zhu Pan Scammers Use Fake Cryptocurrency Trading Pools

The Story of One Scammed Victim in the Crypto Trading Pool Who Lost $22,000 in One Week, according to Sophos

September 20, 2023
Supply Chain Attack Targeting Linux

Kaspersky Reveals Three-year Long Suspected Supply Chain Attack Targeting Linux

September 19, 2023
SIM swaps and eFrauds in Nigeria

NCC Worried over Rising eFrauds in Nigeria’s Telecom Industry

September 15, 2023
Six Signs You Might Need a VPN for Secure Online Activities

Six Signs You Might Need a VPN for Secure Online Activities

September 14, 2023
Next Post
IoT Device Management Market

IoT Device Management Market to hit US$11 Bn by 2028

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Advertisements
Ad 15
Insurance Meet Tech
Advertisements
ADVERTISEMENT
  • Trending
  • Comments
  • Latest
​Sodiq Tijani Toju Africa

Meet Sodiq Tijani, a Product Expert and Entrepreneur Banking the Unbanked

March 2, 2023
Product Led vs Sales Led Business Models

Product Led vs Sales Led Business Models: What Startups Should Know

January 10, 2023
Samsung Galayx A04e - Cheapest Samsung Phones in 2023

Cheapest Samsung Phones in 2023

September 11, 2023
Sodiq Tijani Youcloudpay

How Sodiq Tijani is Empowering African SMEs for Economic Growth

February 9, 2022
Google Cybersecurity Scholarship

Google Recognizes Shortage of Cybersecurity Experts in Africa, Announces Scholarships

22

Ad Dynamo Has Eyes on Nigeria – CEO

19

Digital Marketing in Africa: Bringing Much-Needed Skills to Nigeria’s Youth

16

Ad Dynamo by Aleph Group Launches free Digital Academy

14
microfinance banks

CBN Launches Portal for Seamless Licensing of Microfinance Bank

September 21, 2023
EBANX

Brazilian Fintech EBANX Expands into Eight New Africa Markets

September 21, 2023
Africa-America Institute

Africa-America Institute Honours MTN Group for Helping in Africa’s Digital Transformation

September 21, 2023
Six Signs You Might Need a High-Speed Mesh Wi-Fi System

Six Signs You Might Need a High-Speed Mesh Wi-Fi System

September 21, 2023

Follow Us

APPLY

Underdog Tech Award
Apply

InDrive Launches Underdog Tech Award to Reward African Founders

by Joel Nwankwo
September 20, 2023
0

The Underdog Tech Award, a brand-new international competition, has been launched by InDrive. The e-hailing company aims to uncover the...

Read more

WomenPreneurs

Hiring in South Africa by Jessica Hawkey redAcademy
WomenPreneurs

Women in Business: Q&A with Jessica Hawkey, Founder & MD of redAcademy

by Techeconomy
August 22, 2023
0

"Jessica Hawkey is the Managing Director of redAcademy"

Read more

BusinesSENSE For SMEs

Managing Difficult Customer
BusinesSENSE For SMEs

Five Keys to Managing Difficult Customers

by Techeconomy
August 23, 2023
0

You will at one point in your business be confronted with dealing with difficult customers. So, mastering the right strategies...

Read more
  • About Us
  • Career
  • Contact Us
  • Policy

© 2023 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Phones
      • Gadgets and Appliances
      • Accessories
      • Laptop
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Partners
    • Editorial
  • Podcast
  • TECHECONOMY TV

© 2023 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.