arXiv:2605.07034v1 Announce Type: new Abstract: Modern cybersecurity relies heavily on static machine-learning-based malware classifiers. However, transformations such as packing and other non-semanti…
cyberintel.kalymoon.com · 22118 articles · updated every 4 hours · grows forever
arXiv:2605.07034v1 Announce Type: new Abstract: Modern cybersecurity relies heavily on static machine-learning-based malware classifiers. However, transformations such as packing and other non-semanti…
arXiv:2605.07008v1 Announce Type: new Abstract: The monolithic nature of widely used commodity operating systems means that vulnerabilities in one software component potentially compromise the entire …
arXiv:2605.06932v1 Announce Type: new Abstract: The harvest-now, decrypt-later (HNDL) threat--adversaries intercepting and archiving ciphertext today for retrospective decryption once quantum computer…
arXiv:2605.06910v1 Announce Type: new Abstract: Software obfuscation and encryption present persistent challenges for program comprehension and security analysis, particularly when adversaries conceal…
arXiv:2605.06894v1 Announce Type: new Abstract: Machine learning (ML) in real-world systems must contend with concept drift, adversarial actors, and a spectrum of potential features with varying costs…
arXiv:2605.06880v1 Announce Type: new Abstract: DNS integrations leverage the discovery, trust, and uniqueness of the global Domain Name System with a linkage to another naming ecosystem, so the DNS n…
arXiv:2605.06853v1 Announce Type: new Abstract: The transition to post-quantum cryptography in blockchain systems such as Bitcoin and Ethereum is often framed as a purely cryptographic problem. In pra…
arXiv:2605.06846v1 Announce Type: new Abstract: Recent work identifies secret loyalties as a distinct threat from standard backdoors. A secret loyalty causes a model to covertly advance the interests …
arXiv:2605.06833v1 Announce Type: new Abstract: Misbehavior detection in Vehicle-to-Everything (V2X) networks is a second line of defense against insider falsification attacks that cryptographic mecha…
arXiv:2605.06760v1 Announce Type: new Abstract: We demonstrate that language models can autonomously replicate their weights and harness across a network by exploiting vulnerable hosts. The agent inde…
arXiv:2605.06744v1 Announce Type: new Abstract: Attackers willing to compromise computing systems can use malicious peripherals as an attack vector, threatening users that cannot verify the hardware's…
arXiv:2605.06738v1 Announce Type: new Abstract: Autonomous AI agents now transact at production scale -- 69,000 bots executing 165 million transactions across 50 million USDC in cumulative volume on a…
arXiv:2605.06731v1 Announce Type: new Abstract: Personalized LLM agents maintain persistent cross-session state to support long-horizon collaboration. Yet, this persistence introduces a subtle but cri…
arXiv:2605.06718v1 Announce Type: new Abstract: Malware and malware-based attacks are becoming more prevalent and complex. Attackers regularly come up with new techniques that have the ability to evad…
arXiv:2605.06713v1 Announce Type: new Abstract: Agentic AI systems can plan, call tools, inspect code, interact with web applications, and coordinate multi-step workflows. These same capabilities chan…
arXiv:2605.06669v1 Announce Type: new Abstract: Educational LLM tutors face a core AI alignment challenge: they must follow user intent while preserving pedagogical constraints and safety policies. We…
A vulnerability was found in Devs Palace ERP Online up to 4.0.0 . It has been declared as problematic . Affected by this issue is some unknown functionality of the file /inventory/sales_save . The man…
A vulnerability was found in Devs Palace ERP Online up to 4.0.0 . It has been rated as problematic . This affects an unknown part of the file /inventory/add_new_customer . This manipulation causes cro…
A vulnerability categorized as problematic has been discovered in Devs Palace ERP Online up to 4.0.0 . This vulnerability affects unknown code of the file /accounts/mr-save . Such manipulation leads t…
A vulnerability identified as problematic has been detected in WebAssembly Binaryen up to 117 . This issue affects the function IRBuilder::makeBrOn of the file src/wasm/wasm-ir-builder.cpp of the comp…