Securely Built
banner
securelybuilt.bsky.social
Securely Built
@securelybuilt.bsky.social
Securely Built is on the hunt for insecurity in the world where we can leverage our decades of experience in cyber and engineering to banish insecure technology from whence it came. Find out more at: securelybuilt.com
I guess that's one way to "limit the problem". Just make people pay for it 🤷

Grok has yanked its image-generation toy out of the hands of most X users after the UK government openly weighed a ban over the AI feature that "undressed" people on command.…
X pulls Grok images after UK ban threat over undress tool
: Image generation paywalled on X after ministers and regulators start asking awkward questions
www.theregister.com
January 9, 2026 at 12:51 PM
Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution.
Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyb...
thehackernews.com
January 8, 2026 at 12:42 PM
I built an AI training course for people who want to understand LLM #cybersecurity without hype. What’s the #1 thing you wish more #AI courses explained clearly?
January 2, 2026 at 12:47 PM
Check out the latest article on threat modeling of cloud/hybrid environments.

open.substack.com/pub/securely...
December 30, 2025 at 5:57 PM
Happy Holidays! My book "Threat Modeling Best Practices" is $9.99 for a limited time—only via direct order from Packt.

Learn to model threats in an increasingly insecure environment.

Don't miss out!

www.packtpub.com/en-us/produc...

#Cybersecurity #MicrosoftSecurityCopilot #HolidayDeals
Threat Modeling Best Practices | Security | eBook
Proven frameworks and practical techniques to secure modern systems. Instant delivery. Top rated Security products.
www.packtpub.com
December 24, 2025 at 1:33 PM
A successful 2025!
December 17, 2025 at 9:32 PM
Still trying to understand how to integrate threat modeling in an Agile SDLC? It’s easier than you think.

securelybuilt.substack.com/p/shifting-l...
Shifting Left for Speed: Threat Modeling in the Agile SDLC
The Strategic Shift Left: Threat Modeling as a Proactive Design Practice
securelybuilt.substack.com
December 5, 2025 at 10:22 AM
Few organizations can see past their tier-1 suppliers in their supply chain leading to blind spots and unmodeled threats:

open.substack.com/pub/securely...

#supplychain #cybersecurity #riskmanagement
November 19, 2025 at 4:26 PM
Your reminder that our digital world is fragile and extremely interdependent.
Cloudflare down: X and more apps hit by internet outage
The company says it is working to understand the full impact of a problem which potentially "impacts multiple customers."
www.bbc.com
November 18, 2025 at 2:30 PM
Attackers are using Gemini to develop a "Thinking Robot" that can adapt and evolve like a living organism and can potentially be used for spying purposes or even to create a data processing agent.

This highlights the potential for AI-powered threats to bypass traditional security measures.
Here's how spies and crooks abuse Gemini AI
: Meanwhile, others tried to social-engineer the chatbot itself
go.theregister.com
November 5, 2025 at 8:40 PM
New #book release on #threatmodeling. See link below:
October 31, 2025 at 3:50 PM
Does you AI ChatBot open your attack surface? You bet it does.

open.substack.com/pub/securely...
October 29, 2025 at 2:32 PM
Unlike traditional AI tools that just process input and give output, agents operate autonomously in an ecosystem.

Read more below for a practical roadmap for what you can actually implement with AI Agents:

securelybuilt.substack.com/p/from-react...
From Reactive to Proactive
How AI Agents Are Transforming Security Operations
securelybuilt.substack.com
October 3, 2025 at 7:26 PM
Saw this on another platform:

"Companies think AI will deliver senior level impact for junior level costs. Which means they will not pay senior salaries nor hire juniors."

Is this yet another pressure on the market or possibly just anecdotal?
October 1, 2025 at 12:28 AM
Hammer's can be used to build a house....or destroy it.
September 15, 2025 at 11:19 AM
Reposted by Securely Built
Watch out as hackers are using dual-threat attacks combining phishing, Muck Stealer, Info Stealer, ConnectWise RAT, and SimpleHelp RAT to steal data and bypass security.

Read: hackread.com/muck-stealer...

#CyberSecurity #Malware #Phishing #Scam #InfoSec
Muck Stealer Malware Used Alongside Phishing in New Attack Waves
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
September 12, 2025 at 11:17 AM
While I'm bummed that Sir David Attenborough didn't narrate this, I'm thrilled to announce that this book has been provided in audio format!

You can use the "laappsec40" code at checkout to get 40%

Learn everything from tooling and pipeline development to setting up a #security program.

#appsec
September 11, 2025 at 10:50 AM
Reposted by Securely Built
⚠️ Blood center hit by ransomware, data theft confirmed

The New York Blood Center experienced a #ransomware attack in January, where hackers accessed and stolen personal info (names, SSNs, driver IDs, financial data, and clinical records).

#ransomNews #NYBloodCenter #databreach
September 11, 2025 at 10:02 AM
Feels like a low bar, but we have to start somewhere.
September 10, 2025 at 10:47 AM
Reposted by Securely Built
Germany charges hacker with Rosneft cyberattack in latest wake-up call for critical infrastructure.

Read more in my article on the Exponential-e blog: vhttps://www.exponential-e.com/blog/germany-charges-hacker-with-rosneft-cyberattack-in-latest-wake-up-call-for-critical-infrastructure
September 5, 2025 at 2:10 PM
“AI is coming for my job” is a common refrain from many tech workers today.

We’ve all heard that AI is increasingly taking over entry-level and low-skill tech jobs, either fully automating them or augmenting workflows to reduce staffing needs.

So are we all doomed?

#ai #jobs #cybersecurity
AI Is Taking My Job
How Artificial Intelligence is Reshaping Cybersecurity Careers
open.substack.com
September 5, 2025 at 6:35 PM
And now, for something completely different
🚨 *Scattered Lapsus$ Hunters threaten Google with data leak*

On September 1, 2025, the “Scattered Lapsus$ Hunters” group demanded Google fire two security analysts (one from Threat Intelligence, one from Mandiant), or they’d leak alleged internal data.

#ransomNews #threatactor #infosecintel
September 5, 2025 at 12:56 PM
Are we over the hype yet about AI replacing jobs?

Has the reality set in on the actual efficacy and cost (financial and ecological) of AI.

Have the constraints and concerns finally risen to a level where we realize that AI will perhaps not be used to replace all workers?
September 3, 2025 at 7:27 PM
Sometimes the devil is in the details:

SquareX Passkeys Pwned attack actually relies on malware to hijack the creation of a new passkey, not to steal existing ones.

This falls outside the FIDO threat model, which assumes a trusted browser/OS environment.
I'm here for @dangoodin.bsky.social debunking some wild claims about apparent passkey insecurity made from the Defcon stage, the TL;DR of which is that if your endpoint is compromised, all bets are off arstechnica.com/security/202...
Unpacking Passkeys Pwned: Possibly the most specious research in decades
Researchers take note: When the endpoint is compromised, all bets are off.
arstechnica.com
September 2, 2025 at 11:38 AM