StormWatch Cybersecurity Advisory | Important Notice to ChatGPT Users | Unauthorized Chat Sharing and Public Exposure by Hunter Storm Published 2025 August 3 ChatGPT Data Exposure | What Happened? Several users have discovered that some of their ChatGPT conversations were shared publicly without their consent. These shared chats: Were
What Is AI? | How AI Works
What Is AI? | How AI Works and What You’re Actually Interacting With What is AI? Have you ever chatted with an artificial intelligence (AI) and wondered what was behind the words on the screen? This article will help you understand what AI is and how AI works. You’ll also
Conversations with a Ghost | People in High Stakes Roles
Conversations with a Ghost | A True Story of the Architects of the Digital Unknown This is a true story based upon my work in artificial intelligence (AI) and cybersecurity research. Names and roles have been generalized to protect individuals and systems. It is written for the ones who stayed
How Algorithmic Mislabeling Hides Helpful Content (Part 1 | Yandex)
Low-Value? High Stakes | How Algorithms Hide Helpful Content and What We Can Do About It So there I was, sipping coffee and minding my own high-value business, when Yandex decided to let me know that my comprehensive, well-researched article on protecting your identity after a data breach was officially
What You Need to Know to Protect Your Web Hosting Environment
How a Former CISO Uncovered Systemic Hosting Failures and What You Need to Know to Protect Your Web Hosting Environment Ever wonder if your web hosting is operating as designed? Are your metrics lagging and is your site rank dropping? It might not be your product or your website. Instead,