ThreatLink

ThreatLink

Home
Notes
Archive
About
Welcome!
ThreatLink – the newsletter about third-party threats
Apr 2 • 
Etienne

Share this post

ThreatLink
ThreatLink
Welcome!
Inside LLM Part 2 - Prompt injection & Sensitive Information Disclosure
Continuing this series exploring LLMs—how they work and the new risks they bring to the surface
Jul 18 • 
Etienne

Share this post

ThreatLink
ThreatLink
Inside LLM Part 2 - Prompt injection & Sensitive Information Disclosure
Inside LLMs – Part 1: Foundations and DeepSeek’s Unusual Approach
DeepSeek and the New LLM Wave: Innovation, Cost Efficiency, and Open Risks
Jun 20 • 
Etienne
2

Share this post

ThreatLink
ThreatLink
Inside LLMs – Part 1: Foundations and DeepSeek’s Unusual Approach
XZ Utils: Infiltrating Open Source Through Social Engineering
Imagine waking up to discover that a seemingly harmless open-source tool, deeply integrated within your systems, has covertly turned into a threat
May 8 • 
Etienne

Share this post

ThreatLink
ThreatLink
XZ Utils: Infiltrating Open Source Through Social Engineering
Uber Breach and MFA Fatigue
Deep Dive into the MFA Fatigue Technique
Apr 4 • 
Etienne
1

Share this post

ThreatLink
ThreatLink
Uber Breach and MFA Fatigue
Coming soon
This is ThreatLink.
Apr 2 • 
Etienne

Share this post

ThreatLink
ThreatLink
Coming soon
ThreatLink
ThreatLink
Writing about cyberattacks, threat types, and attacker strategies—all in the context of third parties. Passionate about tech, security, startups, and storytelling. Co-founder of Galink

ThreatLink

AboutArchiveSitemap

Share this publication

ThreatLink
threatlink
ThreatLink
© 2025 Etienne
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share