
Amazing “Jailbreak” Bypasses ChatGPT’s Ethics Safeguards
OpenAI has been scrambling to enact new rules that prevent its wildly popular ChatGPT from generating text from being generally horrible — like by promoting things that are unethical, illegal, or just plain controversial. Back in the day, you could ask the red-hot AI...

Black Cell expands global reach with new UAE office
We, at Black Cell, a cybersecurity consulting firm focusing on protecting critical infrastructures, are proud to announce the opening of our newest office in the United Arab Emirates. Operating under Black Cell FZCO, this local office will enable us to better serve...

Black Cell attained Security Solutions Partner designation
We are pleased to announce that we have earned a Solutions Partner designation in the Security solution area. By attaining the Security partner designation, our Cloud Security business unit demonstrates the breadth of capabilities in delivering customer success based...

How Zero Trust Can Help
How Zero Trust Can Help Over the past year, there have been a number of successful ransomware attacks that have made online security a hot topic across the globe. In fact, just recently it was reported that Advanced, a technology vendor that provides the...

Hacking scandal of Hungarian KRÉTA public education administration system
As a member of the socially responsible professional community, Black Cell would like to raise awareness on best practices to improve an organization’s overall compliance posture with a case study from Hungary on the occasion of World Data Protection Day. On 7...

ChatGPT for Offensive and Defensive Cyber
ChatGPT for Offensive and Defensive Cyber There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article,...

Forensic Pattern Of Life Analysis
Forensic Pattern Of Life Analysis Pattern of life analysis isn’t a new concept to anyone who’s ever been involved with intelligence, in particular surveillance. It’s all about the habits that people — suspects, persons of interest, crime victims, or those...

Top 10 Cybersecurity Reports 2022
Top 10 Cybersecurity Reports 2022 We have collected the most relevant cybersecurity reports of 2022 that are worth checking. Crowdstrike 2022 Crowdstrike Global Threat Report ENISA (European Union Agency for Cybersecurity) ENISA Threat Landscape 2022 Forbes...

Cybersquatting | Infographic
Cybersquatting encompasses many techniques such as those that can be seen in the table below. Each example shows a cybersquatted version of “google.com”