Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
threatmodeling
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Train Your Antivirus: RL to harden malware detectors
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 8
How to Train Your Antivirus: RL to harden malware detectors
#
ai
#
mlsecurity
#
adversarialml
#
threatmodeling
Comments
Add Comment
1 min read
Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 8
Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience
#
ai
#
aiagents
#
aisecurity
#
threatmodeling
Comments
Add Comment
2 min read
When light becomes a weapon: laser-based command injection attacks on voice assistants
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 8
When light becomes a weapon: laser-based command injection attacks on voice assistants
#
iotsecurity
#
infosec
#
threatmodeling
#
cybersecurity
1
 reaction
Comments
Add Comment
2 min read
Threat Modeling 101: How to Predict and Prevent Cyber Attacks
Samuel Ekirigwe
Samuel Ekirigwe
Samuel Ekirigwe
Follow
Mar 1
Threat Modeling 101: How to Predict and Prevent Cyber Attacks
#
threatmodeling
#
cybersecurity
#
proactivesecurity
Comments
Add Comment
3 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 15 '25
Anansi’s Web as Neural Architecture: From Folklore to Framework
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account