Threat Modeling Insider – October 2025

The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.

Threat Modeling: Expanding scope to the software supply chain

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Threat Modeling Insider – September 2025

The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.

Threat Modeling and Threat Intelligence: Distinct and Complementary

Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…

Voka Webinar – Toreon: AI & CyberSecurity

Ontdek hoe jouw onderneming zijn AI-strategie kan redden. Uw concurrenten gebruiken al AI. Uw medewerkers ook – of u het nu weet of niet. Maar…

CVE-2025-9709: New CVE documents major vulnerability in common chip

This is the latest of such publications and the contribution by one of the researchers in our network: CVE-2025-9709, which discusses discovered vulnerabilities in a…

Threat Modeling Insider – August 2025

The latest Threat Modeling Insider features a guest article on how gamification can make ML security risks tangible.

Space Cybersecurity and Threat Modeling

Explore how threat modeling strengthens space cybersecurity. From GPS spoofing and satellite jamming to supply chain risks, Robert Hurlbut examines unique attack surfaces in space…

Flashing Your Lights: CVE-2025-7202

A CSRF vulnerability in Elgato Key Lights let websites flash your lights remotely. Here’s how CVE-2025-7202 was discovered and fixed.

Leaking Secrets with AI: The Hidden Risks of ChatGPT’s Share Feature

Learn how ChatGPT’s ‘Share’ feature can accidentally expose sensitive data to Google. Discover hidden risks and how to protect your AI conversations.

Start typing and press Enter to search

Shopping Cart