
Evil-GPT: The “Enemy of ChatGPT”
In the ever-evolving landscape of cybercrime, one tool has emerged as a particularly insidious player: Evil-GPT. Marketed on hacker forums on the dark web as the “ultimate enemy of ChatGPT” and the “best alternative to WormGPT,” this malicious artificial intelligence...

The dark side of generative AI: Unveiling the AI threat landscape
Generative artificial intelligence (Gen AI) has unleashed a new threat landscape for cybercrime. Threat actors now weaponize large language models (LLMs), which once served primarily legitimate purposes. Underground forums and dark web marketplaces are buzzing with “dark LLMs” — custom...

XDR: Your cybersecurity wingman
As cybercrime continues to rise, the need for automation in cybersecurity has become clear. IT security experts often lack the expertise, headcount, and time to manage the increasing number of alerts and potential threats effectively. For managed service providers (MSPs)...

Accelerating cybersecurity Time to Resolution (TTR)
When it comes to cyberattacks and data breaches, time to respond (TTR) is a critical metric for managed service providers (MSPs), but one that can be challenging as the frequency and sophistication of threats continue to evolve. MSPs typically have...

Threat Spotlight: How ransomware for rent rules the threat landscape
This year’s annual review of ransomware attacks looks at the threat from two perspectives. First, for the third year running we’ve taken a global sample of reported ransomware attacks and analyzed what they tell us about ransomware attackers and their...

Spring-cleaning checklist for defending against ransomware
Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

Evolution of cybersecurity: The rise of XDR in the 2020s
As part of our 5-part series on the evolution of cybersecurity, the fifth and final entry highlights the need for manageability and visibility as the frequency of cyberattacks increased sharply, coupled with a shortage of cybersecurity professionals, and the growth...