home.social

#threatmodeling — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #threatmodeling, aggregated by home.social.

  1. Are you responsible for all the battles? Then stop and let the monsters rampage a bit. Remember, you can always swoop down and take out the final boss before the credits roll at the end of the movie. #appsec #owasp #llm #agentic #ai #security #cloud #devops #threatmodeling #agile #games

  2. Are you responsible for all the battles? Then stop and let the monsters rampage a bit. Remember, you can always swoop down and take out the final boss before the credits roll at the end of the movie. #appsec #owasp #llm #agentic #ai #security #cloud #devops #threatmodeling #agile #games

  3. Are you responsible for all the battles? Then stop and let the monsters rampage a bit. Remember, you can always swoop down and take out the final boss before the credits roll at the end of the movie. #appsec #owasp #llm #agentic #ai #security #cloud #devops #threatmodeling #agile #games

  4. Are you responsible for all the battles? Then stop and let the monsters rampage a bit. Remember, you can always swoop down and take out the final boss before the credits roll at the end of the movie. #appsec #owasp #llm #agentic #ai #security #cloud #devops #threatmodeling #agile #games

  5. Are you responsible for all the battles? Then stop and let the monsters rampage a bit. Remember, you can always swoop down and take out the final boss before the credits roll at the end of the movie. #appsec #owasp #llm #agentic #ai #security #cloud #devops #threatmodeling #agile #games

  6. Do you feel like yelling at the world for not doing threat modeling? No need to yell, the tools are free! Copi - The OWASP® Cornucopia Game Engine - (copi.owasp.org) Is free to use and perfect for distributed teams. #appsec #owasp #llm #agentic #ai #cloud #devops #threatmodeling #agile #games

  7. Do you feel like yelling at the world for not doing threat modeling? No need to yell, the tools are free! Copi - The OWASP® Cornucopia Game Engine - (copi.owasp.org) Is free to use and perfect for distributed teams. #appsec #owasp #llm #agentic #ai #cloud #devops #threatmodeling #agile #games

  8. Do you feel like yelling at the world for not doing threat modeling? No need to yell, the tools are free! Copi - The OWASP® Cornucopia Game Engine - (copi.owasp.org) Is free to use and perfect for distributed teams. #appsec #owasp #llm #agentic #ai #cloud #devops #threatmodeling #agile #games

  9. Do you feel like yelling at the world for not doing threat modeling? No need to yell, the tools are free! Copi - The OWASP® Cornucopia Game Engine - (copi.owasp.org) Is free to use and perfect for distributed teams. #appsec #owasp #llm #agentic #ai #cloud #devops #threatmodeling #agile #games

  10. Yes! It’s time to party! The OWASP Foundation is celebrating 25 incredible years of open source security. That’s why OWASP Cornucopia is launching its 25th anniversary edition. #appsec #security #owasp #cornucopia #llm #agentic_ai #devops #cloud #frontend #threatmodeling

  11. "Just use Signal" is not a threat model.
    At BSides312, HelpMeRob is covering the security assumptions, risk trade-offs, and blind spots that put orgs at risk even when they're using the "right" tools. 30+ years across federal law enforcement, military cyber defense, and digital forensics.
    The encryption isn't the weak link. The assumptions are.
    May 16th. Chicago.
    🎟️ bsides312.org
    #BSides312 #InfoSec #CyberSecurity #Signal #OpSec #ThreatModeling #Privacy #Chicago

  12. Security is shifting from technical to behavioral.
    James Robinson, CISO at Netskope:
    “Employees are both cybersecurity’s most important and weakest component.”
    • Shadow AI expanding
    • Employees using genAI without visibility
    • Risk driven by usage, not intent

    Read more:
    technadu.com/how-a-teen-found-

    #CISODecoded #GenAI #ShadowAI #Cybersecurity #ThreatModeling

  13. Security is shifting from technical to behavioral.
    James Robinson, CISO at Netskope:
    “Employees are both cybersecurity’s most important and weakest component.”
    • Shadow AI expanding
    • Employees using genAI without visibility
    • Risk driven by usage, not intent

    Read more:
    technadu.com/how-a-teen-found-

    #CISODecoded #GenAI #ShadowAI #Cybersecurity #ThreatModeling

  14. Security is shifting from technical to behavioral.
    James Robinson, CISO at Netskope:
    “Employees are both cybersecurity’s most important and weakest component.”
    • Shadow AI expanding
    • Employees using genAI without visibility
    • Risk driven by usage, not intent

    Read more:
    technadu.com/how-a-teen-found-

    #CISODecoded #GenAI #ShadowAI #Cybersecurity #ThreatModeling

  15. Security is shifting from technical to behavioral.
    James Robinson, CISO at Netskope:
    “Employees are both cybersecurity’s most important and weakest component.”
    • Shadow AI expanding
    • Employees using genAI without visibility
    • Risk driven by usage, not intent

    Read more:
    technadu.com/how-a-teen-found-

    #CISODecoded #GenAI #ShadowAI #Cybersecurity #ThreatModeling

  16. Last chance to RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  17. Last chance to RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  18. Last chance to RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  19. Last chance to RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  20. Last chance to RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  21. Grab a spot at the March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  22. Grab a spot at the March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  23. Grab a spot at the March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  24. Grab a spot at the March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  25. Grab a spot at the March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  26. RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  27. RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  28. RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  29. RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  30. RSVP for our March Meetup!

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    In this edition we have 1 long form talk.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    RSVP at buff.ly/G72uBEA

    #cybersecurity #infrastructuresecurity #security #threatmodeling

  31. In this month's meetup we have switched things a bit. We will have 1 long form talk with plenty of chances to discuss.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    RSVP fast as we are already filling up at buff.ly/G72uBEA

    #cyberthreat #infrastructuresecurity #security #threatmodeling

  32. In this month's meetup we have switched things a bit. We will have 1 long form talk with plenty of chances to discuss.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    RSVP fast as we are already filling up at buff.ly/G72uBEA

    #cyberthreat #infrastructuresecurity #security #threatmodeling

  33. In this month's meetup we have switched things a bit. We will have 1 long form talk with plenty of chances to discuss.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    RSVP fast as we are already filling up at buff.ly/G72uBEA

    #cyberthreat #infrastructuresecurity #security #threatmodeling

  34. In this month's meetup we have switched things a bit. We will have 1 long form talk with plenty of chances to discuss.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    RSVP fast as we are already filling up at buff.ly/G72uBEA

    #cyberthreat #infrastructuresecurity #security #threatmodeling

  35. In this month's meetup we have switched things a bit. We will have 1 long form talk with plenty of chances to discuss.

    Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

    Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

    RSVP fast as we are already filling up at buff.ly/G72uBEA

    #cyberthreat #infrastructuresecurity #security #threatmodeling

  36. APT37’s Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.

    Observed tradecraft includes:
    • LNK-based initial execution
    • Embedded PowerShell payload extraction
    • Ruby interpreter abuse (v3.3.0)
    • Scheduled task persistence (5-minute interval)
    • USB-based covert bidirectional C2
    • Multi-stage backdoor deployment
    Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.

    The removable media relay model enables:
    – Command staging offline
    – Data exfiltration without internet access
    – Lateral spread across isolated systems
    – Surveillance via Windows spyware
    This reinforces a critical point:
    Air-gap controls must extend beyond physical disconnection — including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.

    Are critical infrastructure operators prepared for USB-mediated C2 relays?

    Source: bleepingcomputer.com/news/secu

    Engage below.

    Follow TechNadu for high-signal threat intelligence insights.
    Repost to elevate awareness.

    #Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture

  37. Supply chain security meets reproducible builds.
    ExpressVPN is sponsoring PlanetNix 2026, highlighting the intersection of privacy, open-source infrastructure, and build reproducibility.
    Event focus areas:
    • Deterministic builds
    • Secure deployment pipelines
    • DevSecOps integration
    • Team-level onboarding models
    • Production-grade Nix environments

    Reproducibility is increasingly tied to:
    – Software supply chain integrity
    – Auditability
    – Compliance frameworks
    – Infrastructure security baselines
    As build determinism becomes more relevant to threat modeling, open-source tooling like Nix may play a critical role.

    Source: planetnix.com/

    Are reproducible systems now essential for modern security architecture?

    Engage in the comments.
    Follow TechNadu for high-signal infosec reporting.
    Repost to amplify open-source security discussions.

    #Infosec #DevSecOps #SupplyChainSecurity #ReproducibleBuilds #NixOS #OpenSourceSecurity #ExpressVPN #CloudSecurity #InfrastructureSecurity #ThreatModeling

  38. Supply chain security meets reproducible builds.
    ExpressVPN is sponsoring PlanetNix 2026, highlighting the intersection of privacy, open-source infrastructure, and build reproducibility.
    Event focus areas:
    • Deterministic builds
    • Secure deployment pipelines
    • DevSecOps integration
    • Team-level onboarding models
    • Production-grade Nix environments

    Reproducibility is increasingly tied to:
    – Software supply chain integrity
    – Auditability
    – Compliance frameworks
    – Infrastructure security baselines
    As build determinism becomes more relevant to threat modeling, open-source tooling like Nix may play a critical role.

    Source: planetnix.com/

    Are reproducible systems now essential for modern security architecture?

    Engage in the comments.
    Follow TechNadu for high-signal infosec reporting.
    Repost to amplify open-source security discussions.

    #Infosec #DevSecOps #SupplyChainSecurity #ReproducibleBuilds #NixOS #OpenSourceSecurity #ExpressVPN #CloudSecurity #InfrastructureSecurity #ThreatModeling

  39. Supply chain security meets reproducible builds.
    ExpressVPN is sponsoring PlanetNix 2026, highlighting the intersection of privacy, open-source infrastructure, and build reproducibility.
    Event focus areas:
    • Deterministic builds
    • Secure deployment pipelines
    • DevSecOps integration
    • Team-level onboarding models
    • Production-grade Nix environments

    Reproducibility is increasingly tied to:
    – Software supply chain integrity
    – Auditability
    – Compliance frameworks
    – Infrastructure security baselines
    As build determinism becomes more relevant to threat modeling, open-source tooling like Nix may play a critical role.

    Source: planetnix.com/

    Are reproducible systems now essential for modern security architecture?

    Engage in the comments.
    Follow TechNadu for high-signal infosec reporting.
    Repost to amplify open-source security discussions.

    #Infosec #DevSecOps #SupplyChainSecurity #ReproducibleBuilds #NixOS #OpenSourceSecurity #ExpressVPN #CloudSecurity #InfrastructureSecurity #ThreatModeling