article thumbnail

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

Specifically, researchers believed that the current version of SB 315 could chill security research—both the purely academic and the “white hats”—ultimately discouraging individuals from identifying vulnerabilities in networks and alerting system administrators of the issues. The incident and Uber’s response prompted the U.S.

article thumbnail

CyberheistNews Vol 13 #19 [Watch Your Back] New Fake Chrome Update Error Attack Targets Your Users

KnowBe4

Take the following example, provided by Phish Labs: [CONTINUED] Blog post with screenshot: [link] Are Your Users' Passwords. This tests against ten types of weak password related threats for example; Weak, Duplicate, Empty, Never Expires, plus six more. Are your users' passwords…P@ssw0rd? must help cover $1.4 billion in losses."

article thumbnail

CyberheistNews Vol 13 #11 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

KnowBe4

In another case, a doctor input his patient's name and their medical condition and asked ChatGPT to craft a letter to the patient's insurance company. This example uses 'Ring Video Doorbell' as the display name, but recipients should be suspicious that the sender's email address isn't an authentic Ring email address.