An attacker could combine the individual’s social media username, profile information, and clues from the LLM-generated image to figure out the person’s email address using search engine queries or open-source intelligence, he explained.
Tag: #threatmodel
(Cyber) Risk = Probability of Occurrence x Damage
https://thehackernews.com/2024/05/get-cyber-resilient-with-cvss.html?m=1