Cryptography (under)engineering
Security of Web Applications: Top 6 Risks To Avoid
Introduction to Threat Modeling
Working Effectively with Legacy Code
This World of Ours
VGTU Intro to Threats 2015