all InfoSec news
Topic: academic papers
Jailbreaking LLMs with ASCII Art
1 month, 1 week ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
1 month, 2 weeks ago |
www.schneier.com
LLM Prompt Injection Worm
1 month, 2 weeks ago |
www.schneier.com
AIs Hacking Websites
1 month, 4 weeks ago |
www.schneier.com
On Software Liabilities
2 months, 2 weeks ago |
securityboulevard.com
On Software Liabilities
2 months, 2 weeks ago |
www.schneier.com
Teaching LLMs to Be Deceptive
2 months, 2 weeks ago |
www.schneier.com
A Self-Enforcing Protocol to Solve Gerrymandering
2 months, 2 weeks ago |
www.schneier.com
A Self-Enforcing Protocol to Solve Gerrymandering
2 months, 2 weeks ago |
securityboulevard.com
Poisoning AI Models
2 months, 4 weeks ago |
www.schneier.com
Side Channels Are Common
2 months, 4 weeks ago |
www.schneier.com
Side Channels Are Common
2 months, 4 weeks ago |
securityboulevard.com
Voice Cloning with Very Short Samples
3 months, 1 week ago |
www.schneier.com
On IoT Devices and Software Liability
3 months, 1 week ago |
www.schneier.com
Improving Shor’s Algorithm
3 months, 2 weeks ago |
www.schneier.com
TikTok Editorial Analysis
3 months, 2 weeks ago |
www.schneier.com
AI Decides to Engage in Insider Trading
4 months, 3 weeks ago |
www.schneier.com
Extracting GPT’s Training Data
4 months, 3 weeks ago |
www.schneier.com
New SSH Vulnerability
5 months, 1 week ago |
securityboulevard.com
New SSH Vulnerability
5 months, 1 week ago |
www.schneier.com
How hate sites evade the censor
5 months, 1 week ago |
www.lightbluetouchpaper.org
Coin Flips Are Biased
6 months ago |
securityboulevard.com
Model Extraction Attack on Neural Networks
6 months, 1 week ago |
securityboulevard.com
Model Extraction Attack on Neural Networks
6 months, 1 week ago |
www.schneier.com
How to Spread Disinformation with Unicode
8 months, 3 weeks ago |
www.lightbluetouchpaper.org
Automatically Finding Prompt Injection Attacks
8 months, 3 weeks ago |
www.schneier.com
ZKP Cryptography Developer
9 months, 1 week ago |
www.iacr.org
WEIS 2023 – Liveblog
9 months, 2 weeks ago |
www.lightbluetouchpaper.org
Security and Human Behaviour 2023
10 months, 1 week ago |
www.lightbluetouchpaper.org
AI-Generated Steganography
10 months, 1 week ago |
www.schneier.com
How Attorneys Are Harming Cybersecurity Incident Response
10 months, 2 weeks ago |
www.schneier.com
Will GPT models choke on their own exhaust?
10 months, 2 weeks ago |
www.lightbluetouchpaper.org
Brute-Forcing a Fingerprint Reader
10 months, 3 weeks ago |
www.schneier.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
Jailbreaking LLMs with ASCII Art
1 month, 1 week ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
1 month, 2 weeks ago |
www.schneier.com
LLM Prompt Injection Worm
1 month, 2 weeks ago |
www.schneier.com
AIs Hacking Websites
1 month, 4 weeks ago |
www.schneier.com
On Software Liabilities
2 months, 2 weeks ago |
securityboulevard.com
On Software Liabilities
2 months, 2 weeks ago |
www.schneier.com
Teaching LLMs to Be Deceptive
2 months, 2 weeks ago |
www.schneier.com
A Self-Enforcing Protocol to Solve Gerrymandering
2 months, 2 weeks ago |
www.schneier.com
A Self-Enforcing Protocol to Solve Gerrymandering
2 months, 2 weeks ago |
securityboulevard.com
Poisoning AI Models
2 months, 4 weeks ago |
www.schneier.com
Side Channels Are Common
2 months, 4 weeks ago |
www.schneier.com
Side Channels Are Common
2 months, 4 weeks ago |
securityboulevard.com
Voice Cloning with Very Short Samples
3 months, 1 week ago |
www.schneier.com
On IoT Devices and Software Liability
3 months, 1 week ago |
www.schneier.com
Improving Shor’s Algorithm
3 months, 2 weeks ago |
www.schneier.com
TikTok Editorial Analysis
3 months, 2 weeks ago |
www.schneier.com
AI Decides to Engage in Insider Trading
4 months, 3 weeks ago |
www.schneier.com
Extracting GPT’s Training Data
4 months, 3 weeks ago |
www.schneier.com
New SSH Vulnerability
5 months, 1 week ago |
securityboulevard.com
New SSH Vulnerability
5 months, 1 week ago |
www.schneier.com
How hate sites evade the censor
5 months, 1 week ago |
www.lightbluetouchpaper.org
Coin Flips Are Biased
6 months ago |
securityboulevard.com
Model Extraction Attack on Neural Networks
6 months, 1 week ago |
securityboulevard.com
Model Extraction Attack on Neural Networks
6 months, 1 week ago |
www.schneier.com
How to Spread Disinformation with Unicode
8 months, 3 weeks ago |
www.lightbluetouchpaper.org
Automatically Finding Prompt Injection Attacks
8 months, 3 weeks ago |
www.schneier.com
ZKP Cryptography Developer
9 months, 1 week ago |
www.iacr.org
WEIS 2023 – Liveblog
9 months, 2 weeks ago |
www.lightbluetouchpaper.org
Security and Human Behaviour 2023
10 months, 1 week ago |
www.lightbluetouchpaper.org
AI-Generated Steganography
10 months, 1 week ago |
www.schneier.com
How Attorneys Are Harming Cybersecurity Incident Response
10 months, 2 weeks ago |
www.schneier.com
Will GPT models choke on their own exhaust?
10 months, 2 weeks ago |
www.lightbluetouchpaper.org
Brute-Forcing a Fingerprint Reader
10 months, 3 weeks ago |
www.schneier.com
Topic trend (last 90 days)
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Werkstudent (w/m/d) - Cyber Security
@ IONOS | Karlsruhe, Germany
Security Operations Manager
@ BambooHR | Utah | Hybrid
Senior Risk and Compliance Analyst
@ Cricket.com | Hyderabad
Cyber Security Architect
@ Lilium | Munich