The latest Threat Modeling Insider features a guest article on how large language models could support practitioners by semi-automating parts of the process.
Threat modeling and threat intelligence are essential practices of a proactive security strategy. This blog post will explore their differences, how they complement each other,…
Ontdek hoe jouw onderneming zijn AI-strategie kan redden. Uw concurrenten gebruiken al AI. Uw medewerkers ook – of u het nu weet of niet. Maar…
This is the latest of such publications and the contribution by one of the researchers in our network: CVE-2025-9709, which discusses discovered vulnerabilities in a…
The latest Threat Modeling Insider features a guest article on how gamification can make ML security risks tangible.
Explore how threat modeling strengthens space cybersecurity. From GPS spoofing and satellite jamming to supply chain risks, Robert Hurlbut examines unique attack surfaces in space…
A CSRF vulnerability in Elgato Key Lights let websites flash your lights remotely. Here’s how CVE-2025-7202 was discovered and fixed.
Learn how ChatGPT’s ‘Share’ feature can accidentally expose sensitive data to Google. Discover hidden risks and how to protect your AI conversations.
The Tea app breach exposed thousands of user selfies with sensitive location metadata, revealing key lessons on protecting privacy by stripping metadata from uploads.
During Toreon’s annual ski trip, Robbe opted out of skiing and hiking to explore the hotel’s Wi-Fi login page for security flaws. While others hit…