Pattern Drive Private Limited

chatgpt-in-cybersecurity

35

How Is ChatGPT In Cybersecurity Both Boon And Bane?

03-02-2023 | Deep Shukla

OpenAI created a chatbot named ChatGPT that was released on the 30th of November 2022. Soon after its launch, it has become the talk of the town owing to its AI capabilities. One million users downloaded the app in a week. ChatGPT has caught the attention of ordinary people who do not have PhDs in data science, unlike most other AI research projects. Users can type in queries and receive human-lik...

Read More
lockbit-ransomware-interview

285

LockBit Ransomware: An Exclusive Interview With The Administrator

18-11-2022 | Deep Shukla

The LockBit ransomware was introduced to the public back in 2019 with LockBit version 1.0. Currently, it is in the 3.0 version. Ransomware has been a threat to date to companies and individuals. This article will completely focus on various information related to ransomware and the group that is running it. We have got an opportunity to know all of it through the ransomware creator himself. But be...

Read More
password-security-risks

368

Password Security Risks: How Employees Risk Companies With Simple Codes?

05-05-2022 | Alex Smith

The past two years have been pretty concerning owing to the increase in the password security risks and cybersecurity breaches, especially ransomware. The initial months of 2020 have seen a steady rise with the various ransomware attacks and have increased in the first half of 2021. By the end of the year 2021, 78.4 million attempted ransomware attacks had been recorded.  Considering the other ho...

Read More
double-extortion-ransomware-attacks

715

How Double Extortion Ransomware Attacks Are Taking Toll On Organizations?

21-12-2021 | Alex Smith

2020 did not only bring with it the pandemic but also a remote workforce that requires access to confidential data and organizational networks. As a result of which the industry has faced a shift to double extortion ransomware attacks. In this condition ransomware first employs data exfiltration even before the system is encrypted by it. This includes databases, contact lists, accounting spreadshe...

Read More