Last chance to RSVP for our March Meetup!

Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

In this edition we have 1 long form talk.

Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

RSVP at https://buff.ly/G72uBEA

#cybersecurity #infrastructuresecurity #security #threatmodeling

Hot take from a guy who spent two decades at investigating cyber crimes:

The term "hacker" tells you almost nothing useful.

What matters, what actually predicts behavior, tactics, and targets,
is WHY they're doing it.

The intelligence community has used M.I.C.E for 70 years to understand spies. That model is shifted to a new ear of online threats.

Money. Ideology. Curiosity . Ego.

I wrote a book applying it to cybersecurity. Not because it's theoretical.

Because in the field, understanding motivation is how you get ahead of attacks.

A money-motivated attacker runs a different kill chain than an ego-driven one.

Treat them the same and your defenses will always be one step behind.

Happy to talk through any of it here. The infosec community on Bluesky
has been one of the best conversations I've had about this stuff.

Book: 'How MICE Threaten Cyber Security' on Amazon.
https://a.co/d/0awR4gNr

#infosec #cybersecurity #threatmodeling

How MICE Threaten Cyber Security: The Mindsets Behind Threat-actors in Our Digital Age: Kraudelt, Anthony: 9798242742079: Amazon.com: Books

How MICE Threaten Cyber Security: The Mindsets Behind Threat-actors in Our Digital Age [Kraudelt, Anthony] on Amazon.com. *FREE* shipping on qualifying offers. How MICE Threaten Cyber Security: The Mindsets Behind Threat-actors in Our Digital Age

Grab a spot at the March Meetup!

Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

In this edition we have 1 long form talk.

Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

RSVP at https://buff.ly/G72uBEA

#cybersecurity #infrastructuresecurity #security #threatmodeling

RSVP for our March Meetup!

Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

In this edition we have 1 long form talk.

Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

RSVP at https://buff.ly/G72uBEA

#cybersecurity #infrastructuresecurity #security #threatmodeling

In this month's meetup we have switched things a bit. We will have 1 long form talk with plenty of chances to discuss.

Josh Corman will be presenting on the various cyber threats to water infrastructure. He will walk through potential scenarios and do a table top exercise.

Big thank you to our hosts Microsoft for and Pentera for sponsoring food and beverages.

RSVP fast as we are already filling up at https://buff.ly/G72uBEA

#cyberthreat #infrastructuresecurity #security #threatmodeling

A poll on a debate I am having at work with a colleague.

In my case, the code we are considering is infrastructure-as-code; so terraform, cloudformation, CDK, etc. So I'm not as focused on app code like React, NodeJS, Python, etc. Infrastructure code. I'll put my opinions in a reply to this post so that I don't bias answers.

Asserted: You can do a threat model in the IDE using only the code and artifacts present in the repo.

#threatmodel #threatmodeling #appsec #iac

Yes, Always
13.3%
Yes, Often
0%
Sometimes
6.7%
Rarely
40%
Basically Never
26.7%
Some other option?
13.3%
Poll ended at .

RE: https://hachyderm.io/@evacide/116178700239265110

hot take: @protonprivacy didn’t fail you. YOUR OPSEC failed you.

encryption β‰  anonymity. these are not the same thing and never have been.

Proton did exactly what they said they’d do - encrypted your emails and complied with lawful Swiss legal orders. that’s the whole deal. that’s what you signed up for.

the credit card you used to pay for your β€œanonymous” account was never part of the encryption. that was always traceable. that was always a liability.

and here’s the kicker - Proton literally accepts Monero and cash. they gave you the tools. you chose the Visa.

#infosec #opsec #privacy #ProtonMail #threatmodeling #monero​​​​​​​​​​​​​​​​

Operational resilience stress test: physical strikes on AWS facilities.

Two UAE data centers directly struck, one Bahrain facility damaged. Structural and power impacts confirmed, fire suppression triggered secondary water damage.

Architectural implications:
β€’ Regional redundancy can absorb single-facility failure
β€’ Multi-zone impact increases capacity strain
β€’ Physical concentration risk remains under-modeled
β€’ Geopolitical targeting of critical infrastructure is evolving
AWS regions are segmented into availability zones, physically separated yet within limited geographic proximity.

Risk reality:
Cloud is distributed β€” not dematerialized.
Security and resilience teams should evaluate:
- Cross-region active-active configurations
- Conflict-zone dependency exposure
- Infrastructure concentration mapping
- Real-time migration readiness
Is physical conflict integrated into your threat model?

Source: https://www.securityweek.com/iranian-strikes-on-amazon-data-centers-highlight-industrys-vulnerability-to-physical-disasters/

Engage below.
Follow TechNadu for infosec, infrastructure resilience, and geopolitical tech risk intelligence.
Repost to inform your network.

#Infosec #CloudSecurity #AWS #CriticalInfrastructure #GeopoliticalRisk #DisasterRecovery #BusinessContinuity #CyberResilience #CloudRisk #DigitalInfrastructure #ThreatModeling

Incident overview: LexisNexis Legal & Professional division.

Confirmed unauthorized access to limited servers containing mostly legacy data (pre-2020). Data reportedly included:
β€’ Customer identifiers
β€’ Business contact information
β€’ Support tickets, survey IP addresses
β€’ Account records for agencies and firms

Company position:
– Contained incident
– No SSNs or financial data involved
– No product/service compromise observed
– Forensic firm engaged, law enforcement notified

Legacy data remains a recurring exposure vector:
Weak segmentation
Reduced monitoring priority
Accumulated credential reuse
Extended retention without operational necessity
Are your deprecated systems treated as high-risk assets or low-priority archives?

Source: https://therecord.media/lexisnexis-says-hackers-accessed-legacy-data

Engage below.
Follow TechNadu for infosec, breach intelligence, and enterprise risk analysis.
Repost to inform your network.

#Infosec #DataBreach #LexisNexis #LegacyInfrastructure #CyberIncident #SecurityEngineering #RiskManagement #ThreatModeling #DataProtection #CyberResilience #SecurityNews

We published reflections on our human-centered threat modeling work with Throneless Tech’s secure communications platform, Bitpart.

As part of our work with UXD Lab, we mapped threats across the entire human stack, from maintainers and admins to users. A failure in any one cascades into the others.

Our biggest insight? If you’re building for journalists, activists or defenders, human-centered threat modeling should be core infrastructure.

https://superbloom.design/learning/blog/making-threat-modeling-human-key-takeaways-from-our-work-with-bitpart/

#ThreatModeling #CivicTech