all InfoSec News
Topic: academic papers
RADIUS Vulnerability
2 weeks, 2 days ago |
www.schneier.com
Model Extraction from Neural Networks
3 weeks, 4 days ago |
www.schneier.com
Model Extraction from Neural Networks
3 weeks, 4 days ago |
securityboulevard.com
Breaking the M-209
1 month ago |
www.schneier.com
Security and Human Behavior 2024
1 month ago |
www.lightbluetouchpaper.org
Using LLMs to Exploit Vulnerabilities
1 month, 1 week ago |
www.schneier.com
LLMs Acting Deceptively
1 month, 2 weeks ago |
www.schneier.com
Exploiting Mistyped URLs
1 month, 2 weeks ago |
www.schneier.com
Privacy Implications of Tracking Wireless Access Points
1 month, 3 weeks ago |
securityboulevard.com
Privacy Implications of Tracking Wireless Access Points
1 month, 3 weeks ago |
www.schneier.com
On the Zero-Day Market
2 months ago |
www.schneier.com
New Attack Against Self-Driving Car AI
2 months, 2 weeks ago |
www.schneier.com
New Attack Against Self-Driving Car AI
2 months, 2 weeks ago |
securityboulevard.com
Dan Solove on Privacy Regulation
3 months ago |
securityboulevard.com
Dan Solove on Privacy Regulation
3 months ago |
www.schneier.com
Licensing AI Engineers
4 months ago |
www.schneier.com
Jailbreaking LLMs with ASCII Art
4 months, 2 weeks ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
4 months, 2 weeks ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
4 months, 2 weeks ago |
securityboulevard.com
LLM Prompt Injection Worm
4 months, 3 weeks ago |
www.schneier.com
LLM Prompt Injection Worm
4 months, 3 weeks ago |
securityboulevard.com
Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered
4 months, 3 weeks ago |
www.schneier.com
AIs Hacking Websites
5 months ago |
www.schneier.com
Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
5 months, 1 week ago |
www.schneier.com
On Software Liabilities
5 months, 2 weeks ago |
www.schneier.com
On Software Liabilities
5 months, 2 weeks ago |
securityboulevard.com
Teaching LLMs to Be Deceptive
5 months, 2 weeks ago |
www.schneier.com
A Self-Enforcing Protocol to Solve Gerrymandering
5 months, 3 weeks ago |
securityboulevard.com
A Self-Enforcing Protocol to Solve Gerrymandering
5 months, 3 weeks ago |
www.schneier.com
Poisoning AI Models
6 months ago |
www.schneier.com
Side Channels Are Common
6 months ago |
www.schneier.com
Side Channels Are Common
6 months ago |
securityboulevard.com
Code Written with AI Assistants Is Less Secure
6 months, 1 week ago |
www.schneier.com
Voice Cloning with Very Short Samples
6 months, 1 week ago |
www.schneier.com
On IoT Devices and Software Liability
6 months, 2 weeks ago |
www.schneier.com
Improving Shor’s Algorithm
6 months, 3 weeks ago |
www.schneier.com
TikTok Editorial Analysis
6 months, 3 weeks ago |
www.schneier.com
Security Analysis of a Thirteenth-Century Venetian Election Protocol
7 months, 2 weeks ago |
www.schneier.com
AI Decides to Engage in Insider Trading
7 months, 3 weeks ago |
www.schneier.com
AI Decides to Engage in Insider Trading
7 months, 3 weeks ago |
securityboulevard.com
Extracting GPT’s Training Data
7 months, 3 weeks ago |
www.schneier.com
New SSH Vulnerability
8 months, 1 week ago |
securityboulevard.com
New SSH Vulnerability
8 months, 1 week ago |
www.schneier.com
How hate sites evade the censor
8 months, 2 weeks ago |
www.lightbluetouchpaper.org
Hacktivism, in Ukraine and Gaza
9 months, 1 week ago |
www.lightbluetouchpaper.org
Coin Flips Are Biased
9 months, 1 week ago |
securityboulevard.com
Coin Flips Are Biased
9 months, 1 week ago |
www.schneier.com
Model Extraction Attack on Neural Networks
9 months, 2 weeks ago |
www.schneier.com
Model Extraction Attack on Neural Networks
9 months, 2 weeks ago |
securityboulevard.com
New Revelations from the Snowden Documents
10 months ago |
www.schneier.com
Bots Are Better than Humans at Solving CAPTCHAs
11 months, 1 week ago |
www.schneier.com
Detecting “Violations of Social Norms” in Text with AI
11 months, 1 week ago |
www.schneier.com
The Inability to Simultaneously Verify Sentience, Location, and Identity
11 months, 2 weeks ago |
www.schneier.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
RADIUS Vulnerability
2 weeks, 2 days ago |
www.schneier.com
Model Extraction from Neural Networks
3 weeks, 4 days ago |
www.schneier.com
Model Extraction from Neural Networks
3 weeks, 4 days ago |
securityboulevard.com
Breaking the M-209
1 month ago |
www.schneier.com
Security and Human Behavior 2024
1 month ago |
www.lightbluetouchpaper.org
Using LLMs to Exploit Vulnerabilities
1 month, 1 week ago |
www.schneier.com
LLMs Acting Deceptively
1 month, 2 weeks ago |
www.schneier.com
Exploiting Mistyped URLs
1 month, 2 weeks ago |
www.schneier.com
Privacy Implications of Tracking Wireless Access Points
1 month, 3 weeks ago |
securityboulevard.com
Privacy Implications of Tracking Wireless Access Points
1 month, 3 weeks ago |
www.schneier.com
On the Zero-Day Market
2 months ago |
www.schneier.com
New Attack Against Self-Driving Car AI
2 months, 2 weeks ago |
www.schneier.com
New Attack Against Self-Driving Car AI
2 months, 2 weeks ago |
securityboulevard.com
Dan Solove on Privacy Regulation
3 months ago |
securityboulevard.com
Dan Solove on Privacy Regulation
3 months ago |
www.schneier.com
Licensing AI Engineers
4 months ago |
www.schneier.com
Jailbreaking LLMs with ASCII Art
4 months, 2 weeks ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
4 months, 2 weeks ago |
www.schneier.com
A Taxonomy of Prompt Injection Attacks
4 months, 2 weeks ago |
securityboulevard.com
LLM Prompt Injection Worm
4 months, 3 weeks ago |
www.schneier.com
LLM Prompt Injection Worm
4 months, 3 weeks ago |
securityboulevard.com
Friday Squid Blogging: New Extinct Species of Vampire Squid Discovered
4 months, 3 weeks ago |
www.schneier.com
AIs Hacking Websites
5 months ago |
www.schneier.com
Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
5 months, 1 week ago |
www.schneier.com
On Software Liabilities
5 months, 2 weeks ago |
www.schneier.com
On Software Liabilities
5 months, 2 weeks ago |
securityboulevard.com
Teaching LLMs to Be Deceptive
5 months, 2 weeks ago |
www.schneier.com
A Self-Enforcing Protocol to Solve Gerrymandering
5 months, 3 weeks ago |
securityboulevard.com
A Self-Enforcing Protocol to Solve Gerrymandering
5 months, 3 weeks ago |
www.schneier.com
Poisoning AI Models
6 months ago |
www.schneier.com
Side Channels Are Common
6 months ago |
www.schneier.com
Side Channels Are Common
6 months ago |
securityboulevard.com
Code Written with AI Assistants Is Less Secure
6 months, 1 week ago |
www.schneier.com
Voice Cloning with Very Short Samples
6 months, 1 week ago |
www.schneier.com
On IoT Devices and Software Liability
6 months, 2 weeks ago |
www.schneier.com
Improving Shor’s Algorithm
6 months, 3 weeks ago |
www.schneier.com
TikTok Editorial Analysis
6 months, 3 weeks ago |
www.schneier.com
Security Analysis of a Thirteenth-Century Venetian Election Protocol
7 months, 2 weeks ago |
www.schneier.com
AI Decides to Engage in Insider Trading
7 months, 3 weeks ago |
www.schneier.com
AI Decides to Engage in Insider Trading
7 months, 3 weeks ago |
securityboulevard.com
Extracting GPT’s Training Data
7 months, 3 weeks ago |
www.schneier.com
New SSH Vulnerability
8 months, 1 week ago |
securityboulevard.com
New SSH Vulnerability
8 months, 1 week ago |
www.schneier.com
How hate sites evade the censor
8 months, 2 weeks ago |
www.lightbluetouchpaper.org
Hacktivism, in Ukraine and Gaza
9 months, 1 week ago |
www.lightbluetouchpaper.org
Coin Flips Are Biased
9 months, 1 week ago |
securityboulevard.com
Coin Flips Are Biased
9 months, 1 week ago |
www.schneier.com
Model Extraction Attack on Neural Networks
9 months, 2 weeks ago |
www.schneier.com
Model Extraction Attack on Neural Networks
9 months, 2 weeks ago |
securityboulevard.com
New Revelations from the Snowden Documents
10 months ago |
www.schneier.com
Bots Are Better than Humans at Solving CAPTCHAs
11 months, 1 week ago |
www.schneier.com
Detecting “Violations of Social Norms” in Text with AI
11 months, 1 week ago |
www.schneier.com
The Inability to Simultaneously Verify Sentience, Location, and Identity
11 months, 2 weeks ago |
www.schneier.com
Topic trend (last 90 days)
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
Coordinador SOC
@ PwC | Buenos Aires
Azure Sentinel Content developer
@ HARMAN International | IN Bengaluru EOIZ Indust Area Campus HCS
Principal Infrastructure Engineer – Product Owner
@ RTX | CO102: 16800 E Centretech Pkwy,Aurora 16800 East Centretech Pkwy Building S75, Aurora, CO, 80011 USA
Future Project | Senior Network Expert - Colombia
@ Unisys | Home Based Colombia
Future Project | Experto en redes - Peru
@ Unisys | Home Based Peru
Associate, Technology Controls Reporting
@ BlackRock | AT8 - 725 Ponce de Leon Ave NE, Atlanta