CYBERSECURITY

ChatGPT

Does ChatGPT Change Infosec?

Author: Sylvia Killinen | Security Engineer | GRIMM It’s been widely commented that ChatGPT generates bullshit. That isn’t a pejorative phrase but rather a term of art, as in Herbert’s “On Bullshit,” which defines it as speech intended to persuade, regardless of its truth value. Bullshit is distinguished from lying by a lack of intent […]

Does ChatGPT Change Infosec? Read More »

threat actors cybersecurity

Professional evil: a glimpse into the tactics and motivations of malicious threat actors

There are plenty of articles detailing the uses of patience, creativity, and above all, learning from your failures. Those are all requirements for excelling in any technical field. Instead of rehashing that baseline, let’s take a look at how a threat actor might stage attacks to create the most extensive damage, regardless of the target.  

Professional evil: a glimpse into the tactics and motivations of malicious threat actors Read More »

Why You Should Care About Infrastructure Security Month

November is Critical Infrastructure Security & Resilience Month, a nationwide effort to raise awareness and reaffirm the commitment to keep our nation’s critical infrastructure secure and resilient. This year’s theme is Infrastructure Security is National Security: Together We Can Drive Down Risk, Build Resilience, which covers the spectrum of infrastructure security.  So, why should you

Why You Should Care About Infrastructure Security Month Read More »

Old dog, same tricks

Introduction When enterprise software gets old, should we consider it tried-and-true, or decrepit and a threat, like the superglue holding the soles of my running shoes together? Old software that’s been humming around in the background hasn’t necessarily broken, but that doesn’t mean that you can necessarily trust it; in fact there should be a

Old dog, same tricks Read More »

SCYTHE Announces $3 Million in Initial Financing Round Led by Gula Tech Adventures

Earlier today we announced that we raised $3 million in an initial funding round led by the co-founder of Tenable, Ron Gula of Gula Tech Adventures. This investment will help accelerate our ability to deliver our attack simulation platform and drive new product development. We’ve planned a roadmap of new features and innovations that will disrupt the

SCYTHE Announces $3 Million in Initial Financing Round Led by Gula Tech Adventures Read More »

Delta Debugging

Delta Debugging Have you ever been fuzzing a program and received a crash, only to find the input file was huge?  Trying to manually determine which portions of an input file trigger the bug can be an extremely frustrating and time consuming process. Huge input files can make the triage of bugs much harder. This

Delta Debugging Read More »

GRIMM’s New Michigan Cybersecurity Research Lab

GRIMM’s New Michigan Cybersecurity Research Lab

GRIMM has been a long time advocate of building Connected and Automated Vehicles (CAV) with a security-by-design approach. We advance our automotive and aerospace clients’ cybersecurity posture for all forms of embedded security concerns. For example, for the past several years, GRIMM has been a co-sponsor and staple at the SANS Automotive conference – a one-stop shop

GRIMM’s New Michigan Cybersecurity Research Lab Read More »