ChatGPT launches Study Mode
OpenAI is expanding ChatGPT with a new function for learners. The so-called Study Mode is designed not only to provide answers, but also to promote understanding - with targeted guidance and interactive questions.
OpenAI is expanding ChatGPT with a new function for learners. The so-called Study Mode is designed not only to provide answers, but also to promote understanding - with targeted guidance and interactive questions.
The infamous Trojan from 2019 is once again making headlines. Security researchers from ESET have discovered that AsyncRAT is now even more dangerous and has spread much more widely thanks to new variants.
An unknown individual apparently impersonated US Secretary of State Marco Rubio with deceptively real audio and text messages on the messenger Signal. The aim of the campaign was to influence politicians in the USA and abroad. This is an extremely worrying example of the growing threat posed by deepfakes.
The rapid development of generative AI is putting managers worldwide under enormous pressure to act. According to the latest Global AI Confessions Report, 69% of German CEOs fear that failed AI strategies will lead to management changes by the end of 2025. At the same time, experts are warning of the growing phenomenon of AI washing, meaning the misleading marketing of supposed AI solutions without any real added value.
Microsoft is increasingly in the crosshairs of hackers. According to the latest Microsoft Vulnerabilities Report from security company BeyondTrust, a total of 1,360 vulnerabilities were recorded in Microsoft systems in 2024 - more than ever before.
What are the differences between big data, business intelligence and business analytics and how do I move from a sea of data to added data value in the company? Data intelligence plays a central role here, as it bridges the gap between pure data collection and intelligent, automated value creation.
What began as a ploy by commercial cybercriminals is now becoming a method used by state-supported hacker groups: The ClickFix technique. Originally used by financially motivated attackers to circumvent security mechanisms, it is now being used specifically by actors from North Korea, Iran and Russia for espionage purposes.
Despite security updates being installed, cyber criminals have managed to gain permanent access to FortiGate devices. The attackers exploit known vulnerabilities that have long since been closed - but they go one better: they leave behind a so-called backdoor through which they retain access even after the patch.
The days when cyber security was an afterthought are over. The EU Cyber Resilience Act (CRA) and the EU's new Product Liability Directive make it clear: software must be secure from the outset. "Security by design" is thus turning from a buzzword into a survival strategy. Cycode shows how companies are mastering this paradigm shift in four concrete steps.
Despite its age, the ClickFix method remains a popular tool in the arsenal of cybercriminals. Security researchers from Sophos X-Ops came across the sophisticated attack tactic again in their latest analysis.