{"id":265062,"date":"2023-07-28T14:38:50","date_gmt":"2023-07-28T11:38:50","guid":{"rendered":"https:\/\/shop.thekernel.ua\/new-challenges-and-threats-of-modern-cyberspace-in-the-era-of-chatgpt-how-is-the-criminal-s-portrait-changing"},"modified":"2023-07-28T14:43:49","modified_gmt":"2023-07-28T11:43:49","slug":"new-challenges-and-threats-of-modern-cyberspace-in-the-era-of-chatgpt-how-is-the-criminal-s-portrait-changing","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/new-challenges-and-threats-of-modern-cyberspace-in-the-era-of-chatgpt-how-is-the-criminal-s-portrait-changing","title":{"rendered":"New challenges and threats of modern cyberspace in the era of ChatGPT: how is the criminal&#8217;s portrait changing?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">OpenAI introduced GPT chat version 3 in late 2022, based on large language models. He knew how to hold a conversation like a real person, communicate in many languages, pass exams, write software code and even blog. Already after 2 months, the number of his supporters reached more than 100 million. There were also those who were dissatisfied with the introduction of artificial intelligence to the masses. In addition, the cybercriminal community has also shown excessive interest in this tool. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It turned out that ChatGPT can easily create a phishing email that anyone will believe, or write a malicious program that will find and extract sensitive data from a computer or spread viruses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What&#8217;s next? Artificial intelligence for us friend or foe? Is it a dangerous toy in the hands of criminals? Let&#8217;s take a look at what GPT chat can really do, how much stronger it has made cyber criminals, and how to best defend yourself in today&#8217;s cyber world. <\/span><\/p>\n<p><b>Plan of the article:<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#1\"><span style=\"font-weight: 400;\">Portrait of a cybercriminal in the era of ChatGPT<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#2\"><span style=\"font-weight: 400;\">Exactly how scammers use GPT chat<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#3\"><span style=\"font-weight: 400;\">How to recognize fraudulent attacks<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"#4\">YubiKey&#8217;s hardware devices against phishing<\/a><\/li>\n<\/ol>\n<h2 id=\"1\"><b>Portrait of a cybercriminal in the era of ChatGPT<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">Experts of the site <\/span><a href=\"https:\/\/lexinform.com.ua\/\"><span style=\"font-weight: 400;\">LexinForm<\/span><\/a><span style=\"font-weight: 400;\"> note that cybercriminals fall into a fairly wide range of people: from highly qualified specialists to ordinary amateurs. All of them have different status in society, different professional knowledge, occupy different positions: from a storekeeper to a boss. Hackers and crackers also differ in their level of education. But still, thanks to the research of domestic and international experts, it was possible to create a typical portrait of a computer criminal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The future criminal gets acquainted with the computer since childhood. Adores and explores it by all available means. He tries to acquire the necessary skills for working with a computer both in lectures on informatics, cybernetics, neurobionics, and on his own, studying computers, information technologies, and various communication networks, such as the Internet and its analogues. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The age of offenders ranges from 15 to 45 years, of which:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">33%<\/span><\/td>\n<td><span style=\"font-weight: 400;\">up to 20 years<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">54%<\/span><\/td>\n<td><span style=\"font-weight: 400;\">from 20 to 40 years<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">13%<\/span><\/td>\n<td><span style=\"font-weight: 400;\">older than 40 years<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">About 83% of fraudsters in the world are men. If they are women, they have the following professions: secretary, accountant, economist, controller, etc. It should be noted that the female share in this area is constantly growing, as women begin to master technologies and become interested in &#8220;male&#8221; professions, such as programming. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is interesting that a significant proportion of hackers or crackers have weak language skills and write with mistakes. But at the same time, their IQ is above average. Although in general, according to this parameter, cybercriminals are divided as follows:<\/span><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">21%<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IQ above average<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">77%<\/span><\/td>\n<td><span style=\"font-weight: 400;\">average IQ <\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">2%<\/span><\/td>\n<td><span style=\"font-weight: 400;\">IQ below average<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This is because not all cybercriminals are hackers. In general, criminals who engage in hacking are more often called crackers. There are about 180 crackers for one hacker. Because hackers are high-class specialists who have an unusual worldview and certain beliefs. Some of them may even cooperate with the law, helping to catch criminals. These are the so-called &#8220;white hackers&#8221;. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to hackers and crackers, there are attackers who specialize more in social engineering. We talked about this direction in more detail in the article: \u201c<\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering\"><span style=\"font-weight: 400;\">How to protect yourself and colleagues from convincing &#8220;specialists&#8221; in social engineering<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span> <\/p>\n<p><span style=\"font-weight: 400;\">Interestingly, nowadays, attackers do not have to have great mathematical abilities and programming skills. Also, now they will be able to write without mistakes. Because the GPT chat writes without typographical errors, but may allow syntactical errors (which most people who do not have a professional education as a philological editor usually do not notice). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">So the intelligence distribution among attackers can now change: many of those with an average IQ will be able to hack or write malware; and those with a lower than average IQ will be able to deceive people very successfully by creating and sending them very effective and persuasive letters.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Next, we will give several real examples of the use of artificial intelligence by criminals. <\/span><\/p>\n<h2 id=\"2\"><b>Exactly how scammers use GPT chat<\/b><\/h2>\n<hr>\n<h3><b>Creating an information stealer<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u041d\u0430\u043f\u0440\u0438\u043a\u0456\u043d\u0446\u0456 2022 \u0440\u043e\u043a\u0443 \u043d\u0430 \u043e\u0434\u043d\u043e\u043c\u0443 \u0437 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u0438\u0445 \u0445\u0430\u043a\u0435\u0440\u0441\u044c\u043a\u0438\u0445 \u0444\u043e\u0440\u0443\u043c\u0456\u0432 \u0437\u2019\u044f\u0432\u0438\u043b\u0430\u0441\u044f \u0442\u0435\u043c\u0430 \u00abChatGPT \u2013 \u041f\u0435\u0440\u0435\u0432\u0430\u0433\u0438 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u00bb. \u0423 \u043d\u0456\u0439 \u043f\u0456\u0434\u043a\u0440\u0435\u0441\u043b\u0435\u043d\u043e \u043f\u0435\u0440\u0435\u0432\u0430\u0433\u0438 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u044f\u043a\u0435 \u0431\u0443\u043b\u043e \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u043c \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u0448\u0442\u0443\u0447\u043d\u043e\u0433\u043e \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443. \u0421\u0435\u0440\u0435\u0434 \u0456\u043d\u0448\u043e\u0433\u043e \u0432\u0456\u043d \u043f\u043e\u0434\u0456\u043b\u0438\u0432\u0441\u044f \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0441\u0442\u0432\u043e\u0440\u0438\u0432 \u0447\u0430\u0442 GPT \u043d\u0430 Python. \u0426\u0435\u0439 \u043a\u043e\u0434 \u043c\u043e\u0436\u0435 \u0437\u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0438 \u0444\u0430\u0439\u043b\u0438 \u0431\u0430\u0433\u0430\u0442\u044c\u043e\u0445 \u0442\u0438\u043f\u0456\u0432, \u043d\u0430\u043f\u0440\u0438\u043a\u043b\u0430\u0434 .txt, .docx, .pdf, .jpg \u0442\u043e\u0449\u043e, \u043a\u043e\u043f\u0456\u044e\u0432\u0430\u0442\u0438 \u0457\u0445 \u0443 \u0432\u0438\u043f\u0430\u0434\u043a\u043e\u0432\u0443 \u043f\u0430\u043f\u043a\u0443 Temp, \u0430\u0440\u0445\u0456\u0432\u0443\u0432\u0430\u0442\u0438 \u0442\u0430 \u0437\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0443\u0432\u0430\u0442\u0438 \u043d\u0430 \u0432\u0456\u0434\u0434\u0430\u043b\u0435\u043d\u0438\u0439 \u0441\u0435\u0440\u0432\u0435\u0440.<\/span>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/image3-2.png&#8221; alt=&#8221;Creating an information stealer&#8221; title_text=&#8221;Creating an information stealer&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||3%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">In this way, files from personal computers can get to third parties. <\/span><\/p>\n<h3><b>Illegal data encryption<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In December 2022, another hacker forum author published a script he created for the first time using GPT chat (also in Python). <\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/image5-4.png&#8221; alt=&#8221;Illegal data encryption&#8221; title_text=&#8221;Illegal data encryption&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||3%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">This script is able to implement the following functions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Generate a cryptographic key for signing files.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encrypt all files in a specific directory.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use RSA keys or certificates stored in PEM format, as well as MAC signature and blake2 hash function.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It all looks innocent at first glance, but the script can easily be rewritten to completely encrypt someone&#8217;s personal device. That is, this script can easily be turned into a ransomware program.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We remind you once again \u2013 the code was created by a person without programming skills!<\/span><\/p>\n<h3><b>Creation of fake content<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As early as the beginning of 2023, many questions were raised on closed fraud forums about the creation of works of art and their subsequent sale on platforms such as Etsy, although with the help of a slightly different tool \u2013 OpenAI (DALLE2). By the way, in addition to images, attackers tried to sell e-books created using GPT chat.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/image2-2.png&#8221; alt=&#8221;Creation of fake content&#8221; title_text=&#8221;Creation of fake content&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||3%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>Using ChatGPT for phishing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">GPT chat easily and quickly generates messages as if from an official service, for example, from a bank employee, a law enforcement officer, from the administration of the postal service or a support manager at a cryptocurrency service. Such a message can appear so convincing that users are forced to download software that then steals information, or to follow a link and fill out a form \u201cto confirm personal data\u201d.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/image6-2.png&#8221; alt=&#8221;Using ChatGPT for phishing&#8221; title_text=&#8221;Using ChatGPT for phishing&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||3%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 id=\"3\"><b>How to recognize fraudulent attacks<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">If earlier one of the main signs of fraudulent emails was many typographical and other errors, now this parameter can be ignored \u2013 with the help of GPT chat, attackers can now write almost perfectly in any language. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">So you will have to be vigilant in cases that we will talk about in detail later.<\/span><\/p>\n<h3><b>Link<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If the link was sent by someone you don&#8217;t know, then even if he called himself your employee or your new boss, you should not rush to click on the link and even more so to download any files. Through it, you can download a malicious program: Trojan, spyware, virus, etc. <\/span><\/p>\n<p><b>What to do if you received a link like this: <\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Try to find out if the message is really coming from the person it claims to be. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check whether other employees received similar offers, how they reacted to them, what happened after that.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not respond to an email if it looks suspicious. <\/span><\/li>\n<\/ul>\n<h3><b>Filling out forms<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In addition to malicious files, links can lead to phishing sites with an offer to fill out a form under various pretexts: or to confirm account data or payment information, for example, under the pretext of avoiding blocking. <\/span><\/p>\n<p><b>What to do in this case:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remember that no service asks for sensitive information such as account accesses, permanent or one-time passwords or PINs. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check who the email is from, whether there are any errors or extra characters in the site&#8217;s domain.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Go to the official site by typing the address manually or through bookmarks if you have saved them before. Log in and check if the account has the quality of a warning or a message from the site administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not fill out forms on suspicious sites.<\/span><\/li>\n<\/ul>\n<h3><b>Actual context<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraudsters quite often use information about current events in communication to add credibility to their messages. Criminals also try to create a sense of urgency to perform some actions. Otherwise, the chance will disappear, or you will get blocked, or the lives of your loved ones will hang in the balance.<\/span><\/p>\n<p><b>How to distinguish fraudulent messages?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">We recommend in all cases to be alert if you receive any unusual messages. Of course, a person can still believe scammers if they fall into the right context: you took part in a promotion, and now you receive a message about a win; you just talked to your boss about a promotion or a bonus, and the accounting department allegedly asks to confirm your payment information; you wanted to talk to a relative, but he didn&#8217;t answer three times&#8230; Fraudsters can also use the national motto &#8220;Everything will be Ukraine&#8221;, which nevertheless makes a positive impression on a person. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, to protect your data in any case, we recommend using hardware security keys, which are currently the most effective anti-phishing tool. <\/span><\/p>\n<h2 id=\"4\"><b>YubiKey&#8217;s hardware devices against phishing<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">No matter how smart the criminals are, and no matter what the latest tools are used for this, today they will not be able to bypass the simple and effective protection of accounts using the YubiKey produced by the Swedish-American company Yubico. Because these hardware devices work according to the principle of a key to a house, car, or apartment \u2014 only if you have a key can you get inside. Since the key is always with the owner, only he can access his account. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what happens if attackers steal your password, PIN, or two-factor authentication code? Nothing, because to confirm the login or payment operation, you still need to insert the key into the device and touch the metal part, confirming your presence. <\/span><\/p>\n<p><b>Why exactly YubiKey:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The keys work on the basis of asymmetric cryptographic encryption, in which one key is for encryption, it is public, and the other is for decryption. <\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/image4-3.png&#8221; alt=&#8221;asymmetric cryptographic encryption&#8221; title_text=&#8221;asymmetric cryptographic encryption&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||3%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All YubiKey security keys sold in our<\/span> <a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><span style=\"font-weight: 400;\">online store<\/span><\/a><span style=\"font-weight: 400;\">, have support for FIDO2 protocols \u2014 that is, an open driverless protocol for two-factor authentication. That is, the keys work simply \u201cout of the box\u201d. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Most security keys (<\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/compare-yubikey\"><span style=\"font-weight: 400;\">you can compare them here<\/span><\/a><span style=\"font-weight: 400;\">) support one-time OTP passwords and smart card functions. They can be configured using <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/yubikey-manager\"><span style=\"font-weight: 400;\">YubiKey Manager<\/span><\/a><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Global companies such as Google, Amazon, Twitter, Microsoft, Meta use YubiKey security keys to protect their employees&#8217; accounts. By the way, this practice is also implemented in Ukraine, for example, in the companies Naftogaz, Cyber Police, Kyiv Electric Networks, EPAM, FUIB Bank and others. <\/span><\/li>\n<\/ul>\n<h3><b>Do you want to choose reliable hardware devices to protect your accounts or the accounts of your employees? We, as the official distributor of Yubico, invite you to our <\/b><a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><b>Internet-shop<\/b><\/a><b>!<\/b><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_enable_mask_style=&#8221;on&#8221; background_mask_style=&#8221;honeycomb&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Similar materials on the blog<\/h2>\n<p>[\/et_pb_text][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;401&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OpenAI introduced GPT chat version 3 in late 2022, based on large language models. He knew how to hold a conversation like a real person, communicate in many languages, pass exams, write software code and even blog. Already after 2 months, the number of his supporters reached more than 100 million. There were also those [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":265065,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"New Challenges and Threats of Modern Cyberspace in the GPT Era","_seopress_titles_desc":"How is the portrait of a cybercriminal changing? But how to effectively defend against hacker attacks in new conditions.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403,437],"tags":[],"class_list":["post-265062","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-articles-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/265062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=265062"}],"version-history":[{"count":2,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/265062\/revisions"}],"predecessor-version":[{"id":265064,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/265062\/revisions\/265064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/265065"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=265062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=265062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=265062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}