ThreatLink

ThreatLink

Home
Notes
Archive
About
Inside LLM Part 2 - Prompt injection & Sensitive Information Disclosure
Continuing this series exploring LLMs—how they work and the new risks they bring to the surface
Jul 18 • 
Etienne

Share this post

ThreatLink
ThreatLink
Inside LLM Part 2 - Prompt injection & Sensitive Information Disclosure

June 2025

Inside LLMs – Part 1: Foundations and DeepSeek’s Unusual Approach
DeepSeek and the New LLM Wave: Innovation, Cost Efficiency, and Open Risks
Jun 20 • 
Etienne
2

Share this post

ThreatLink
ThreatLink
Inside LLMs – Part 1: Foundations and DeepSeek’s Unusual Approach

May 2025

XZ Utils: Infiltrating Open Source Through Social Engineering
Imagine waking up to discover that a seemingly harmless open-source tool, deeply integrated within your systems, has covertly turned into a threat
May 8 • 
Etienne

Share this post

ThreatLink
ThreatLink
XZ Utils: Infiltrating Open Source Through Social Engineering

April 2025

Uber Breach and MFA Fatigue
Deep Dive into the MFA Fatigue Technique
Apr 4 • 
Etienne
1

Share this post

ThreatLink
ThreatLink
Uber Breach and MFA Fatigue
Welcome!
ThreatLink – the newsletter about third-party threats
Apr 2 • 
Etienne

Share this post

ThreatLink
ThreatLink
Welcome!
Coming soon
This is ThreatLink.
Apr 2 • 
Etienne

Share this post

ThreatLink
ThreatLink
Coming soon
© 2025 Etienne
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share