top of page
All Posts


All (Threat) Models Are Wrong...
"All (threat) models are wrong, but some are useful." - George Box Some quotes are also wrong, but nonetheless, useful . Models are a...

Logic Hazard Labs Staff
Apr 33 min read
Â
Â
Â


Understanding the Latest FDA Guidance on Premarket Cybersecurity Requirements for Medical Devices
Premarket Cybersecurity Updates The FDA released select updates on its premarket cybersecurity guidance yeseterday (26 June 2025, for...
Nicholas Delewski
Jun 273 min read
Â
Â
Â


Is Hot Ones really about hacking?
Some hackers use laptops. Some hackers use cell phones. Others use hot wings. Ok, we know this one needs some explanation, so we'll jump...

Logic Hazard Labs Staff
Apr 93 min read
Â
Â
Â


Quick Wins For Product Security
Product security has never been a simple problem to solve. Computers are subject to both the complexities of raw logic and the physics...

Logic Hazard Labs Staff
Apr 12 min read
Â
Â
Â


What Makes a Good Offensive Security Tool?
Offensive security is about the results, but choosing the right tools can help. We discuss our considerations when choosing tools.

Logic Hazard Labs Staff
Mar 213 min read
Â
Â
Â


Keeping Your Risks In Frame: System Penetration Testing vs Enterprise Penetration Testing
Penetration testing is an important tool to discover and manage risk. Scoping the right type of penetration test helps gather quality data.

Logic Hazard Labs Staff
Jan 163 min read
Â
Â
bottom of page