ThreatLink
Subscribe
Sign in
Home
Notes
Archive
About
Inside LLM Part 2 - Prompt injection & Sensitive Information Disclosure
Continuing this series exploring LLMs—how they work and the new risks they bring to the surface
Jul 18
•
Etienne
Share this post
ThreatLink
Inside LLM Part 2 - Prompt injection & Sensitive Information Disclosure
Copy link
Facebook
Email
Notes
More
June 2025
Inside LLMs – Part 1: Foundations and DeepSeek’s Unusual Approach
DeepSeek and the New LLM Wave: Innovation, Cost Efficiency, and Open Risks
Jun 20
•
Etienne
2
Share this post
ThreatLink
Inside LLMs – Part 1: Foundations and DeepSeek’s Unusual Approach
Copy link
Facebook
Email
Notes
More
May 2025
XZ Utils: Infiltrating Open Source Through Social Engineering
Imagine waking up to discover that a seemingly harmless open-source tool, deeply integrated within your systems, has covertly turned into a threat
May 8
•
Etienne
Share this post
ThreatLink
XZ Utils: Infiltrating Open Source Through Social Engineering
Copy link
Facebook
Email
Notes
More
April 2025
Uber Breach and MFA Fatigue
Deep Dive into the MFA Fatigue Technique
Apr 4
•
Etienne
1
Share this post
ThreatLink
Uber Breach and MFA Fatigue
Copy link
Facebook
Email
Notes
More
Welcome!
ThreatLink – the newsletter about third-party threats
Apr 2
•
Etienne
Share this post
ThreatLink
Welcome!
Copy link
Facebook
Email
Notes
More
Coming soon
This is ThreatLink.
Apr 2
•
Etienne
Share this post
ThreatLink
Coming soon
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts