Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
threatmodeling
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Anansi’s Web as Neural Architecture: From Folklore to Framework
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 15 '25
Anansi’s Web as Neural Architecture: From Folklore to Framework
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
2 min read
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 7 '25
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security
#
ai
#
machinelearning
#
threatmodeling
#
dualusemythology
Comments
Add Comment
5 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Dec 7 '25
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
2 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 30 '25
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
3 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 30 '25
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense
#
ai
#
machinelearning
#
cybersecurity
#
threatmodeling
Comments
Add Comment
3 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Narnaiezzsshaa Truong
Follow
Oct 27 '25
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure
#
cybersecurity
#
owasp
#
securityeducation
#
threatmodeling
3
 reactions
Comments
Add Comment
9 min read
Unpacking Application Security: A Comprehensive Threat Modeling Guide
Tilak Upadhyay
Tilak Upadhyay
Tilak Upadhyay
Follow
Oct 6 '25
Unpacking Application Security: A Comprehensive Threat Modeling Guide
#
security
#
threatmodeling
#
appsec
#
prodsec
1
 reaction
Comments
Add Comment
12 min read
From Manual to Automated: A Deep Dive into Threat Modeling as Code with Python
ellipse2v
ellipse2v
ellipse2v
Follow
Aug 24 '25
From Manual to Automated: A Deep Dive into Threat Modeling as Code with Python
#
tmasc
#
threatmodeling
#
threatmodelascode
Comments
Add Comment
4 min read
Part 2: Are You Threatening Me? Using AWS Q CLI for Your Threat Modeling Program
mgbec
mgbec
mgbec
Follow
for
AWS Community Builders
Jul 22 '25
Part 2: Are You Threatening Me? Using AWS Q CLI for Your Threat Modeling Program
#
threatmodeling
#
amazonq
#
generativeaitools
#
qdeveloperchallenge1
1
 reaction
Comments
Add Comment
5 min read
Are You Threatening Me? Using Amazon Q Developer to Jumpstart Your Threat Modeling Process
mgbec
mgbec
mgbec
Follow
for
AWS Community Builders
Jul 22 '25
Are You Threatening Me? Using Amazon Q Developer to Jumpstart Your Threat Modeling Process
#
qdevelopercli
#
generativeaitools
#
aws
#
threatmodeling
Comments
Add Comment
3 min read
No need to fear the clouds. Play OWASP Cumulus!
johan sydseter
johan sydseter
johan sydseter
Follow
for
OWASP® Foundation
Jun 26 '25
No need to fear the clouds. Play OWASP Cumulus!
#
cloud
#
threatmodeling
#
appsec
#
gamedev
2
 reactions
Comments
1
 comment
4 min read
Does the AI do the threat modeling of your software?
johan sydseter
johan sydseter
johan sydseter
Follow
for
OWASP® Foundation
Jun 11 '25
Does the AI do the threat modeling of your software?
#
ai
#
threatmodeling
#
appsec
#
openai
Comments
Add Comment
3 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Feb 13 '25
Why “Think Like an Attacker” is harmful FT: Threat Modeling?
#
security
#
threatmodeling
#
cybersecurity
#
pentest
Comments
Add Comment
2 min read
Why SysLogs over UDP is silly? Security POV
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Feb 17 '25
Why SysLogs over UDP is silly? Security POV
#
cybersecurity
#
syslog
#
udp
#
threatmodeling
1
 reaction
Comments
Add Comment
2 min read
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively
Makita Tunsill
Makita Tunsill
Makita Tunsill
Follow
Jul 13 '24
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively
#
threatmodeling
#
devsecops
#
cybersecurity
#
learning
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account