Have been playing with developing some threat trees for STRIDE-per-Element #threatmodeling Still quite rough.
https://codeberg.org/neilmadden/stride-threat-trees/src/branch/main/README.md
Have been playing with developing some threat trees for STRIDE-per-Element #threatmodeling Still quite rough.
https://codeberg.org/neilmadden/stride-threat-trees/src/branch/main/README.md
I have seen a lot of efforts to use an #LLM to create a #ThreatModel. I have some insights.
Attempts at #AI #ThreatModeling tend to do 3 things wrong:
1/n
Get pumped for #OWASP Global #AppSec EU in May! Enhance your experience by becoming a Mentor and building lasting connections while assisting others on their journey! Don't miss out, sign up here: https://owasp.wufoo.com/forms/zk2cdkr1qla6o8/ #CyberSecurity #AI #threatmodeling #Barcelona #devsecops #infosec
My #Appsec roundup for April is live. No blow by blow masto post this time because i have to head to the airport soon for #rsac
Lots of #threatmodeling, important improvements to #llm #security and more
Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs https://www.helpnetsecurity.com/2025/04/23/released-mitre-attck-v17-0-now-with-esxi-attack-ttps/ #incidentresponse #attacklifecycle #threatmodeling #attacktools #MITREATT&CK #Don'tmiss #Hotstuff #MITRE #News #ESXi
New Open-Source Tool Spotlight
"Threat-Informed Defense" isn't just a buzzword. The Center for Threat-Informed Defense bridges MITRE ATT&CK with actionable tools like Adversary Emulation Plans and the Attack Workbench, empowering defenders to stay ahead of real-world TTPs. #CyberDefense #MITREATTACK
Want to map security controls to adversary behavior? Check out Mappings Explorer by the Center for Threat-Informed Defense. It aligns your defense strategy directly with the MITRE ATT&CK framework. Precision matters. #ThreatIntelligence #Cybersecurity
Attack Flow helps you visualize how attackers chain techniques into full-scale operations. An indispensable tool for understanding and mitigating attack sequences. Powered by the Center for Threat-Informed Defense. #SOCtools #ThreatModeling
TRAM leverages automation to map CTI reports directly to MITRE ATT&CK tactics and techniques. Less manual work, more actionable insights. Open-source ingenuity at its best. #CyberThreats #MITREATTACK
Building effective cyber analytics requires depth; "Summiting the Pyramid" delivers frameworks to challenge adversary evasion strategies. A research-backed way to harden defenses. #CyberAnalytics #ThreatHunting
Project link on #GitHub
https://github.com/center-for-threat-informed-defense
#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity
— P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking
As you might have guessed I’m doing a lot of thinking about #threatmodeling recently. The one area I think where STRIDE could perhaps do with updating is an increased focus on privacy. I’ve been toying with STRIPED - ie adding Privacy Violation to the list. What do people reckon - is this a good idea, or is privacy its own thing that should be treated separately (eg with LINDUN)?
I've updated the illuminated security #threatmodeling workbook, designed for either pen&paper or #reMarkable2 use. It's now a lot more detailed and with hyperlinked sections. At some point I'll get around to documenting how to use it, but if you've read @adamshostack 's book it should be self-explanatory. Entirely free to download, use etc - CC-BY-SA licensed.
https://illuminated-security.com/threat-modelling-workbook-2/
I generally do some form of STRIDE-per-Element when threat modelling. But I find “spoofing” threats don’t sit well with the others in this methodology. (Is spoofing a process a threat to that process or to its interactors?) I find it much more natural to consider spoofing as a dataflow threat rather than as a threat to a process/datastore/external entity. Although this can result in duplication (if the same endpoint is involved in lots of dataflows), I find it useful to explicitly consider the potential impact of the “same” threat on each flow.
What do others think?
#threatmodeling
"The Signals Network (TSN) and the Reynolds Journalism Institute (RJI) are launching comprehensive training for journalists working with sensitive sources.
The training modules will live permanently on TSN’s website and be free to access."
https://rjionline.org/news/protecting-the-protectors/
#journalism #whistleblowers #digitalsecurity #privacy #threatmodeling
Get ready for an exhilarating time at #OWASP Global #AppSec EU this May! Imagine navigating between sessions, connecting with peers over coffee... Why not enhance your experience by becoming a Mentor? Sign up here: https://owasp.wufoo.com/forms/zk2cdkr1qla6o8/ #CyberSecurity #AI #threatmodeling #infosec #devsecops
Some of my colleagues at #AWS have created an open-source serverless #AI assisted #threatmodel solution. You upload architecture diagrams to it, and it uses Claude Sonnet via Amazon Bedrock to analyze it.
I'm not too impressed with the threats it comes up with. But I am very impressed with the amount of typing it saves. Given nothing more than a picture and about 2 minutes of computation, it spits out a very good list of what is depicted in the diagram and the flows between them. To the extent that the diagram is accurate/well-labeled, this solution seems to do a very good job writing out what is depicted.
I deployed this "Threat Designer" app. Then I took the architecture image from this blog post and dropped that picture into it. The image analysis produced some of the list of things you see attached.
This is a specialized, context-aware kind of OCR. I was impressed at boundaries, flows, and assets pulled from a graphic. Could save a lot of typing time. I was not impressed with the threats it identifies. Having said that, it did identify a handful of things I hadn't thought of before, like EventBridge event injection. But the majority of the threats are low value.
I suspect this app is not cheap to run. So caveat deployor.
#cloud #cloudsecurity #appsec #threatmodeling
OH: "Dragon Drop Interface"
#threatmodeling
OWASP Global AppSec EU 2025 Barcelona Day 1 Agenda Sneak Peek!
The full agenda is now live on our website, and we're kicking things off in Barcelona with an incredible first day! Join in on training sessions on AI Whiteboard Hacking, Full-Stack Pentesting, and iOS and Andriod App Security on day 1.
https://owasp.glueup.com/event/owasp-global-appsec-eu-2025-123983/home.html
An interesting result from psychology is that if you ask people a question and present them with example answers, then they find it much harder to think of responses outside the framing of the examples.
So, if you are going to use an LLM (or even an attack tree/library) for #threatmodeling , use it after you have exhausted the threats you can think of on your own. Engage your brain critically first.
Master Threat Modeling at OWASP Global AppSec 2025 Barcelona!
Led by industry expert Adam Shostack, this course will refine your skills through guided exercises and real-world scenarios, ensuring you leave with practical, actionable expertise.
Hi @elizayer,
Here's a good write-up about #ThreatModeling by @privacyguides:
https://www.privacyguides.org/en/basics/threat-modeling/
Also, these are the VPN they recommended - and why:
**VPN Services**
https://www.privacyguides.org/en/vpn/
[Spoiler: NordVPN is **not** on the list, for good reasons]
Hope this helps.
@krusynth
Boiler up!
I will be a guest of CERIAS’s Weekly Security Seminar Series!
In a talk called “Risk is Not Axiomatic,” we will discuss how systems are secured at a practical engineering level and the science of risk. As we try to engineer secure systems, what are we trying to achieve and how can we do that?
Register now to reserve your spot!
Date: February 12, 2025 @ 4:30pm ET
Location: Zoom
https://shorturl.at/IOtMx
Not the biggest question right now, for sure, but one that still has worldwide effects:
With the ongoing #BrainDrain (aka #layoffs) and meddling in US institutions, how will software security analysis be affected? Can #NVD still be trusted with being the main source of #CVEs in many popular tools?
Should e.g. Europe build up own capacities in vulnerability analysis and set up own databases? Are there existing solutions already?
#infosec #cybersecurity #threatmodeling
Wow. 57 people used my #threatmodeling template in Miro. Out of those I received 5 positive feedback. Five companies are more secure thanks to me!
https://miro.com/miroverse/visual-threat-modeling-template/
Oh. It's under Creative Commons license!