Stats and Bytes

Stats and Bytes

Share this post

Stats and Bytes
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #16
Copy link
Facebook
Email
Notes
More

🎩 Top 5 Security and AI Reads - Week #16

Agentic automated cyber ranges, LLMs classifying CVEs, loss functions in deep learning, trajectory-based data poison detection, and RAG compiler fuzzing.

Apr 20, 2025
∙ Paid

Share this post

Stats and Bytes
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #16
Copy link
Facebook
Email
Notes
More
Share

Welcome to the sixteenth instalment of the Stats and Bytes Top 5 Security and AI Reads weekly newsletter. We're kicking off with a grand approach to cyber range automation through agentic RAG systems, showing how LLMs can transform cybersecurity training environment generation. Next, we look at interesting research on whether LLMs can correctly identify CVEs and create CVSS vectors, showing their strengths with clear criteria while pointing out difficulties with subjective judgements. We then dive into a comprehensive 172-page survey of loss functions and metrics in deep learning—an invaluable reference for anyone training neural networks. Following that, we examine a clever technique for detecting poisoned training samples by analysing loss trajectories through spectral analysis, providing a novel defence against third-party data manipulation. We wrap up with an exploration of how RAG-based systems can be used for compiler fuzzing, successfully generating test cases that identified a…

Keep reading with a 7-day free trial

Subscribe to Stats and Bytes to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Josh Collyer
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More