Syndicated Blog

Berry Networks
Cybersecurity, Threats and AI…
Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion

Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion

Over the past 6 months I have been researching ransomware, and not even from the technical angle (which would very tempting and no doubt, enlightening in it’s own right), but from a ...
AI-Generated Personas: Trust and Deception

AI-Generated Personas: Trust and Deception

And the Ethical Dilemma of Using AI to Create Fake Online Personalities In recent years, advancements in artificial intelligence (AI) have given rise to powerful tools like StyleGAN and sophisticated language models ...
100 Million: How Data Breaches Empower Malicious AI

How Data Breaches Empower Malicious AI: The AT&T Case Study

Once a model is trained on a data set, if you delete that data set, the model still retains the knowledge derived from that data. The impact of the breach lives on, ...
The Ticketmaster Breach – A Never Ending Saga

The Ticketmaster Breach – A Never Ending Saga

The Ticketmaster Saga continues, with over 500 Million users personal and financial details compromised. When will we stop playing whack-a-mole and start taking Personal Data Privacy seriously? ...

OpenSSH regreSSHion Vulnerability

…and…How AI Can Revolutionize Code and Regression Testing Introduction Artificial Intelligence (AI) is transforming numerous industries, and software development is no exception. One of the critical areas where AI can make a ...
Cybernetic Vulnerability: The API Connection

The Ever Expanding Attack Surface

Everything, these days, is connected. The fridge, the oven, your fitness tracker, your thermostat, the locks on your front door… It’s the same for businesses as well as at home. Everything is ...

The Data Privacy Revolution

In an era where data breaches, ransomware, and other cyber threats are becoming increasingly sophisticated, traditional methods of protecting data, PII, and other sensitive details are proving inadequate. Decades ago, neither HTTP ...
Are We All Ready To Embrace AI?

Are We All Ready To Embrace AI?

As artificial intelligence (AI) continues to advance and integrate into various aspect of day to day life, ensuring its safe and secure operation becomes paramount. Imagine for a moment, if you will, ...
Tracking CVEs in real time

Tracking CVEs in real time

Following up on the direction of my last post cves-the-double-edged-sword, where I explored digging for CVEs by vendor, I want to go a step further and stay current with any and all ...

CVEs – The double edged sword

Up until the late 1990’s, vulnerability scanners shared no common point of reference. Two different scanners could detect the same vulnerability, and it would be very difficult for security professionals to tell ...