Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Jensen Huang Says He’s Found a ‘Brand New’ $200B Market for Nvidia

Airbnb enters hotels, extends AI to host integration and customer support

Startup Battlefield 200 applications close on May 27

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Jensen Huang Says He’s Found a ‘Brand New’ $200B Market for Nvidia

    21 May 2026

    Stability AI releases a new audio model that can create six-minute songs

    20 May 2026

    You can now speak in your Gmail inbox, as seen at Google IO 2026

    20 May 2026

    Anthropic has acquired the programming tools startup used by OpenAI, Google and Cloudflare

    19 May 2026

    SandboxAQ brings drug discovery models to Claude — no computer science PhD required

    19 May 2026
  • Apps

    Airbnb enters hotels, extends AI to host integration and customer support

    21 May 2026

    Figma adds an AI assistant to its collaborative canvas

    20 May 2026

    Google has just announced that it is a contender in AI design at IO 2026

    20 May 2026

    Apple announces accessibility feature updates with Apple Intelligence support

    19 May 2026

    Kin Health raises $9 million to build an AI notebook for patients

    19 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    Startup Battlefield 200 applications close on May 27

    21 May 2026

    Venmo’s biggest makeover in years comes at a very interesting time

    11 May 2026

    Fintech startup Parker files for bankruptcy

    10 May 2026

    Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

    7 May 2026

    PayPal says it’s “becoming a tech company again” — that’s AI

    6 May 2026
  • Hardware

    Minimalist Light Phone teams up with Andrew Yang’s Noble Mobile, which pays you to stop doomscrolling

    20 May 2026

    Mach Industries just spent $50 million to solve a major defense technology problem

    20 May 2026

    South Korea’s LetinAR makes optics behind AI glasses

    18 May 2026

    Users are turning to jailbreaking their older Kindles as Amazon ends support

    17 May 2026

    Cerebras raises $5.5 billion, then shares soar to $108, first huge tech IPO of 2026

    15 May 2026
  • Media & Entertainment

    ‘Ask YouTube’ Brings AI Chat Search to Video, Adds Gemini Omni to Shorts

    20 May 2026

    Google’s Gemini Omni turns images, audio and text into video — and that’s just the beginning

    19 May 2026

    Theo Baker spent four years researching Stanford. Before he leaves, here’s what he found.

    19 May 2026

    YouTube viewers watch 2 billion hours of Shorts on TV every month

    14 May 2026

    Digg is trying again, this time as an AI news aggregator

    12 May 2026
  • Security

    Customers say Trump Mobile is leaking their personal information

    20 May 2026

    US cyber agency CISA has exposed bundles of passwords and cloud keys to the open web

    19 May 2026

    Open source tools maker Grafana Labs says hackers stole its code and refuses to pay ransom

    19 May 2026

    NYC Health + Hospitals says hackers stole medical data and fingerprints during breach affecting at least 1.8 million people

    18 May 2026

    Instructure strikes against hackers who breached it twice

    17 May 2026
  • Startups

    NanoClaw creator rejects $20M takeover offer, raises $12M instead

    20 May 2026

    From teenage hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

    20 May 2026

    “Survivor” stars Kyle Fraser and Kamilla Karthigesu present a goal-tracking app, Paprclip

    19 May 2026

    Clio’s $500 million milestone comes just as Anthropic steps up to first stage

    15 May 2026

    Startup Battlefield 200 applications close on May 27

    14 May 2026
  • Transportation

    The Quartermaster builds a sea hive mind

    20 May 2026

    OSHA is investigating the death of a worker at SpaceX’s Starbase site

    19 May 2026

    TechCrunch Mobility: The AI ​​skills arms race is coming for the automotive industry

    18 May 2026

    Tesla Reveals Two Robotaxi Accidents With Remote Controls

    16 May 2026

    RJ Scaringe has raised more than $12 billion in three startups, and investors still want more

    16 May 2026
  • Venture

    Startup Battlefield 200 applications close on May 27

    20 May 2026

    Stilta raises $10.5M from a16z and YC to help companies rediscover patents they forgot they had

    20 May 2026

    Forget Streaming: Status AI Raises $17 Million To Turn Social Media Into Interactive Entertainment

    19 May 2026

    For Eclipse, the $2.5 billion Cerebras win is just the beginning of realizing its physical world thesis

    17 May 2026

    General Catalyst posted VC rage bait and it worked, especially on a16z

    16 May 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»A startup’s guide to cyber threats — threat modeling and proactive security
Security

A startup’s guide to cyber threats — threat modeling and proactive security

techtost.comBy techtost.com11 January 202402 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
A Startup's Guide To Cyber Threats — Threat Modeling And
Share
Facebook Twitter LinkedIn Pinterest Email

Cherlynn Cha is the security operations center manager at ExpressVPN. With her expertise in threat hunting, incident response, cloud security, automation and brand protection, Cherlynn plays a critical role in protecting the security and privacy of ExpressVPN’s more than 4 million subscribers worldwide.

In today’s interconnected in the world, cyber threats are everywhere and always changing. Startups cannot afford to ignore the importance of securing their digital infrastructure. Waiting until a security breach occurs can lead to serious consequences, including financial losses and reputational damage.

ExpressVPN recently partnered with Linking Help, the NGO behind UA.SUPPORT that provides pro bono legal support to Ukrainian refugees, to conduct threat modeling analysis. The goal was to identify security concerns and provide effective mitigation measures. Inspired by this experience, I want to share our methodology with the wider community and empower you to improve your security posture — even with limited resources and other business pressures.

Exploit disclosure with threat modeling

Threat modeling is a key practice in strengthening digital defenses. Simply put, it involves understanding and knowing your organization so that others cannot harm you. The goal is to increase awareness of security gaps and minimize the risk of potential exploits by systematically analyzing potential avenues of abuse.

There are various threat modeling standards and frameworks, and the right choice for you depends on your specific framework. Rather than telling you which one to use, we’ll focus on the underlying methodology we used to conduct threat modeling for UA.SUPPORT, thereby creating effective and practical security recommendations.

Actionable security strategies for startup resilience

1. Know your enemy

Cybersecurity is a complex and multifaceted field, and even with thorough threat modeling, there is always the risk of compromise.

Identifying potential adversaries and their targets is critical to assessing why and how you might be targeted. For example, cybercriminals often target systems that handle credit cards or personally identifiable information (PII), while nation-state adversaries may be interested in information for espionage or intelligence purposes.

In the case of UA.SUPPORT, potential rivals included:

  • Advanced opponents, who have the following objectives:

○ Collection of information about people from Ukraine.

○ Compromise systems to gain unauthorized access, collect sensitive information, or conduct espionage activities.

○ Disrupting the organization’s platform to hinder its ability to help vulnerable people.

  • Opportunistic cybercriminals, who target:
Column Column EC Cyber EC cyber security EC How to guide modeling proactive security startups threat threats
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMy note adds some pill-zazz to the vending machines
Next Article Amazon Prime Video and MGM Studios laid off hundreds of employees
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Customers say Trump Mobile is leaking their personal information

20 May 2026

US cyber agency CISA has exposed bundles of passwords and cloud keys to the open web

19 May 2026

Open source tools maker Grafana Labs says hackers stole its code and refuses to pay ransom

19 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Jensen Huang Says He’s Found a ‘Brand New’ $200B Market for Nvidia

21 May 2026

Airbnb enters hotels, extends AI to host integration and customer support

21 May 2026

Startup Battlefield 200 applications close on May 27

21 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Startup Battlefield 200 applications close on May 27

21 May 2026

Venmo’s biggest makeover in years comes at a very interesting time

11 May 2026

Fintech startup Parker files for bankruptcy

10 May 2026
Startups

NanoClaw creator rejects $20M takeover offer, raises $12M instead

From teenage hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

“Survivor” stars Kyle Fraser and Kamilla Karthigesu present a goal-tracking app, Paprclip

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.