How AI Sec Weekly Works: The Format and Why It Looks This Way
Every Friday digest follows the same structure for a reason. Here's the format breakdown — three top stories, the reading list, and what gets left out.
A short post about the publication, for new subscribers and casual readers. For the editorial philosophy, see what this site is for. Every Friday, AI Sec Weekly publishes the digest. It always has the same structure. Here’s why.
The structure
Three top stories. Not five, not ten. Three. The discipline of picking three forces ranking — readers see what we think mattered most, in order. The fourth-most-important story is more important than the tenth-most-important on a slow week, but a digest of ten dilutes the signal of the top three. Three.
One regulatory item. Whether or not it makes the top three, the digest always surfaces one regulatory development from the week — an AI Office consultation, a member-state DPA action, a US state law update, or a court filing. Even slow weeks have one. Readers in compliance roles depend on this.
One technical item. Same logic — a meaningful CVE, a research paper drop, a new tool release. Even slow weeks have one.
The reading list. Five to ten links to articles, papers, or threads from the week that didn’t make the digest but are worth knowing. Each link gets a one-sentence note: who, what, why bother. No clickbait phrasing.
Corrections. Anything we got wrong in the prior week’s digest is corrected here, with a visible diff. We don’t quietly amend.
What gets left out
- Aggregator content. If a story is “X publication wrote about Y,” we link to X directly instead.
- AI-summarized news posts. They have a recall problem we don’t want to inherit.
- Single-source claims that haven’t been independently verified. Per the methodology ↗.
- Vendor announcements without independent reporting on adoption.
- Speculation about what’s “coming next” in AI security. We cover what happened.
Cadence rationale
Friday afternoon UTC is the publication slot. Reasoning:
- US East morning + US West early morning + EU close-of-business window
- Avoids Monday inbox flood
- Lets readers digest over the weekend if they want
- Aligns with most regulatory press cycles (Friday afternoon dumps)
Daily roundups go out Monday-Thursday at ~14:00 UTC. The weekly digest is the consolidated view; the daily is the working capture.
Why one persona
Theo Voss ↗ is the byline across all five news sites in the network (ai-alert.org ↗, aiincidents.org ↗, aisecweekly.com, aisecdigest.com ↗, techsentinel.news ↗). One persona writing five publications is a strange-looking arrangement; the alternative — random rotating bylines — is what content farms do, and that’s exactly what we’re trying not to be.
A consistent voice means readers can trust the verification rubric is consistent. The same person decided what made the cut yesterday and decides what makes the cut tomorrow.
Subscribing
The most efficient way to follow is the network’s master newsletter, which delivers cluster-tagged digests. You can subscribe at any of the five sites’ footer or directly at the cluster digest URL. Cancel any time, one click.
If you have a tip — a vendor advisory you’ve seen, a regulator action with non-public details, a CVE pre-disclosure — reply to any digest. We protect sources. PGP and Signal at the /about ↗ page.
— Theo
Sources
AI Sec Weekly — in your inbox
Weekly digest of AI security news and analysis. — delivered when there's something worth your inbox.
No spam. Unsubscribe anytime.
Related
How LLM Chatbots Leak Data Through Their Own Rendered Output
A recurring AI-security finding: an injected instruction makes the model emit a markdown image whose URL carries the user's data to an attacker server. Why this works, why CSP is the real fix, and what to check this week.
Indirect Prompt Injection: The Agent Era's Default Vulnerability
As LLM agents gained tools and memory, the dangerous injection stopped coming from the user and started coming from the data the agent reads. A defender's breakdown of why this class resists patching and what containment looks like.
The OWASP LLM Top 10 (2025) Changed More Than the Numbering
The 2025 revision of the OWASP Top 10 for LLM Applications added system-prompt leakage and vector/embedding weaknesses, and reframed the supply-chain entry. Here's what actually shifted and why it matters for defenders.