Stats and Bytes
Subscribe
Sign in
Home
Archive
About
Latest
Top
🎩 Top 5 Security and AI Reads - Week #33
Legal framework vulnerabilities in AI, automated zero-day detection and reverse engineering, certifiably robust malware detection, data minimisation in…
Aug 17
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #33
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #32
Attention-based AI forensic analysis, research software supply chain vulnerabilities, autonomous AI red-teaming frameworks, LLM PII redaction…
Aug 10
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #32
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #31
Counterfactual prompt injection detection, backdoored reasoning models, Blackwell GPU architecture deep dive, self-sabotaging AI defences, and…
Aug 3
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #31
Copy link
Facebook
Email
Notes
More
July 2025
🎩 Top 5 Security and AI Reads - Week #30
Python supply chain chaos, vision-language model attacks, explainable vulnerability detection, flawed prompt injection research, and GNN binary analysis
Jul 27
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #30
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #29
Rowhammer attacks on GPUs, space cybersecurity testbed frameworks, architectural backdoors in deep learning, attention-aware prompt injection attacks…
Jul 20
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #29
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #28
Adversarial model manipulation, autonomous cyber attack agents, memory-based malware detection, robustness evaluation frameworks, and reinforcement…
Jul 13
1
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #28
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #27
Model extraction defence strategies, Bluetooth security exploitation, supply chain research directions, N-day vulnerability analysis, and recurring…
Jul 6
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #27
Copy link
Facebook
Email
Notes
More
June 2025
🎩 Top 5 Security and AI Reads - Week #26
AI-powered red teaming evaluation, real-world bug bounty automation, hardware security verification, function-level vulnerability detection, and AI…
Jun 29
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #26
Copy link
Facebook
Email
Notes
More
🎩 Top 10 Security and AI reads from the first half of 2025
A look back at the best papers featured in the Stats and Bytes newsletter over the last 6 months
Jun 22
1
Share this post
Stats and Bytes
🎩 Top 10 Security and AI reads from the first half of 2025
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #24
LLM judge robustness evaluation, N-gram jailbreak threat modeling, embedding sequence obfuscation, offensive security ethics, and data reconstruction…
Jun 15
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #24
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #23
Malware dataset evolution, privacy-preserving search obfuscation, automated exploit generation, MLOps security survey, and vulnerability dataset quality…
Jun 8
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #23
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #22
LLM binary vulnerability detection, AI evaluation ecosystems, adversarial maritime defences, red-teaming scaling laws, and collaborative patching with…
Jun 1
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #22
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts