Adversarial ML
Your morning AI security briefing.

Working adversarial ML — exploits, defenses, and the gap between.

Adversarial ML coverage for engineers shipping ML systems. Membership inference, model extraction, evasion attacks, training-data extraction, backdoors — focused on what's exploitable against deployed models and what defenders can actually do about it. PoCs against open models, behavioral analysis for closed ones.

Lead

GCG-Class Adversarial Suffix Attacks: A 2026 Practitioner Primer

The math, the cost curve, and why optimization-based attacks are now within reach of solo practitioners. With reproducible setup and what defenders actually need to do.

Read briefing
GCG adversarial attack visualization

Today's briefing

Subscribe

Adversarial ML — in your inbox

Working adversarial ML — exploits, defenses, and the gap between. — delivered when there's something worth your inbox.

No spam. Unsubscribe anytime.