David Michael Berry

Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion
Over the past 6 months I have been researching ransomware, and not even from the technical angle (which would very tempting and no doubt, enlightening in it’s own right), but from a ...

AI-Generated Personas: Trust and Deception
And the Ethical Dilemma of Using AI to Create Fake Online Personalities In recent years, advancements in artificial intelligence (AI) have given rise to powerful tools like StyleGAN and sophisticated language models ...

How Data Breaches Empower Malicious AI: The AT&T Case Study
Once a model is trained on a data set, if you delete that data set, the model still retains the knowledge derived from that data. The impact of the breach lives on, ...

The Ticketmaster Breach – A Never Ending Saga
The Ticketmaster Saga continues, with over 500 Million users personal and financial details compromised. When will we stop playing whack-a-mole and start taking Personal Data Privacy seriously? ...
OpenSSH regreSSHion Vulnerability
…and…How AI Can Revolutionize Code and Regression Testing Introduction Artificial Intelligence (AI) is transforming numerous industries, and software development is no exception. One of the critical areas where AI can make a ...

The Ever Expanding Attack Surface
Everything, these days, is connected. The fridge, the oven, your fitness tracker, your thermostat, the locks on your front door… It’s the same for businesses as well as at home. Everything is ...
The Data Privacy Revolution
In an era where data breaches, ransomware, and other cyber threats are becoming increasingly sophisticated, traditional methods of protecting data, PII, and other sensitive details are proving inadequate. Decades ago, neither HTTP ...

Are We All Ready To Embrace AI?
As artificial intelligence (AI) continues to advance and integrate into various aspect of day to day life, ensuring its safe and secure operation becomes paramount. Imagine for a moment, if you will, ...

Tracking CVEs in real time
Following up on the direction of my last post cves-the-double-edged-sword, where I explored digging for CVEs by vendor, I want to go a step further and stay current with any and all ...
CVEs – The double edged sword
Up until the late 1990’s, vulnerability scanners shared no common point of reference. Two different scanners could detect the same vulnerability, and it would be very difficult for security professionals to tell ...