Monday, February 10, 2025
HomeChatGPTReveal(x) - New Tool to Defend Against ChatGPT Data Leaks

Reveal(x) – New Tool to Defend Against ChatGPT Data Leaks

Published on

SIEM as a Service

Follow Us on Google News

ExtraHop released a new tool called “Reveal(x)” that helps organizations understand their potential risk exposure from employee use of OpenAI ChatGPT by providing visibility into the devices and users on their networks connecting to OpenAI domains.

ChatGPT has become highly familiar due to its potential usage in every organization.

It only took 2 months for ChatGPT to reach 1 billion customers, whereas tik tok took eight years.

A survey taken by Gartner in 2023 revealed that 9 out of 10 respondents chose ChatGPT implementation in their organization by 2025.

Though it has a very high capacity that can help organizations speed up their progress, there are still Intellectual Property risks in using AIaaS tools inside organizations.

Recently, there have been many data leaks associated with ChatGPT. Users using ChatGPT for code reviews or any discovery or research share proprietary information with ChatGPT, which puts confidential data at risk.

In addition, ChatGPT stores the data in public domains and uses this information to answer other user requests. 

ChatGPT is an AI-as-a-Service (AIaaS) that can be widely used in productivity, software development, and research.

Reveal(x) – Data Protection from Rogue AI Use and Accidental Misuse

To overcome this risk, experts at ExtraHop have released Reveal(x), which will show the visibility of the devices and users inside the network that are connected to OpenAI domains.

This can help organizations to implement AI language models and generative AI tools with a lot of control over their data.

This information is crucial for organizations to identify the amount of data sent to OpenAI domains, which can help assess the risk linked with using AI services.

Security Personnel can validate the range of acceptable risks and decrease potential Intellectual Property loss. 

Technical Analysis

Reveal(x) uses network packets as a primary data source for monitoring and analysis during real-time detection.

Reveal(x) can provide this deep visibility and real-time detection because we use network packets as the primary data source for monitoring and analysis, Extrahop said.

It strips the content and payload sent from OSI layers 2-7 (DataLink Layer to Application Layer) for complete data visibility.

Though there have been several rules, regulations, and policies on how AI must store and use data, it is still essential for organizations to understand how to use these services.

ExtraHop Stated that “ExtraHop believes the productivity benefits of these tools outweigh the data exposure risks, provided organizations understand how these services will use their data (and how long they’ll retain it), and provided organizations not only implement policies governing the use of these services but also have a control like Reveal(x) in place that allows them to assess policy compliance and spot risks in real-time.

It is still undetermined how far an AI can go based on its capabilities and the risks it poses to data exposure. 

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...