StormWatch Cybersecurity Advisory | Important Notice to ChatGPT Users | Unauthorized Chat Sharing and Public Exposure by Hunter Storm, Published 2025 August 3 ChatGPT Data Exposure | What Happened? Several users have discovered that some of their ChatGPT conversations were shared publicly without their consent. These shared chats:
Bug in the Bathroom | Microdrone Security and Risk Implications
I Spy. . . a Fly? Imagine swatting what you think is a fly, only to be threatened with FAA violations. Now imagine that fly was not a fly at all. Could it be a biomimetic insect drone instead? Remember that game we played as children, “I Spy?”
How Algorithmic Mislabeling Hides Helpful Content (Part 1 | Yandex)
Low-Value? High Stakes | How Algorithms Hide Helpful Content and What We Can Do About It So there I was, sipping coffee and minding my own high-value business, when Yandex decided to let me know that my comprehensive, well-researched article on protecting your identity after a data breach was
What You Need to Know to Protect Your Web Hosting Environment
By: Hunter Storm Published: April 3, 2025 Hunter Storm is a CISO, Advisory Board Member, Black Ops Team Member, Systems Architect, and Cyber-Physical Hybrid Threat Expert. She is the originator of the Hacking Humans: Ports and Services Model of Social Engineering framework and The Storm Project: AI, Cybersecurity, Quantum,
Swatting as a Weapon | A Preemptive Strategy to Stop Escalation
Preventing Swatting Before It Becomes a Crisis In recent weeks, there has been a noticeable increase in swatting incidents targeting conservative journalists and influencers. This is a dangerous trend, one that puts lives at risk and could easily spiral into a broader crisis if left unchecked. That’s why we
The Trunk Monkey Effect | Why Suppressing the Right People Backfires
Meet the Trunk Monkey Every organization has its high-profile leaders, its visible innovators, and its front-facing experts. But in the background, often underestimated, overlooked, or even outright suppressed, are the true force multipliers. These are the people who see the threats before they happen, fix the unfixable, and step
The Unspoken Cost of Integrity | Why Some of the Best Minds Get Silenced
By: Hunter Storm Published: August 16, 2024 Hunter Storm is a CISO, Advisory Board Member, Black Ops Team Member, Systems Architect, and Cyber-Physical Hybrid Threat Expert. She is the originator of the Hacking Humans: Ports and Services Model of Social Engineering framework and The Storm Project: AI, Cybersecurity, Quantum,



