CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2686 articles  ·  updated every 4 hours · grows forever

2686Total
2643Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning May 11, 2026
HBEE: Human Behavioral Entropy Engine -- Pre-Registered Multi-Agent LLM Simulation of Peer-Suspicion-Based Detection Inversion

arXiv:2605.07472v1 Announce Type: new Abstract: Insider threat detection assumes that an adaptive insider leaves behavioral residue distinguishing them from legitimate users. We test this assumption a…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Forensic analysis of video data deletion and recovery in Honeywell surveillance file system

arXiv:2605.07430v1 Announce Type: new Abstract: Real-time video surveillance systems store recorded video using digital video recorders (DVRs) and network video recorders (NVRs). To support continuous…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
From Conceptual Scaffold to Prototype: A Standardized Zonal Architecture for Wi-Fi Security Training

arXiv:2605.07400v1 Announce Type: new Abstract: Wi-Fi is the dominant wireless access technology, but its widespread use also exposes systems to threats such as rogue access points, deauthentication a…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Combating Organized Platform Abuse: Amplifying Weak Risk Signals with Structural Information

arXiv:2605.07383v1 Announce Type: new Abstract: Large-scale online service platforms face severe challenges from organized platform abuse: multiple forms such as credit card fraud and promotion abuse …

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
A Unified Open-Set Framework for Scalable PUF-Based Authentication of Heterogeneous IoT Devices

arXiv:2605.07340v1 Announce Type: new Abstract: As modern cyber systems scale to include large populations of heterogeneous IoT devices, securing them against impersonation and forgery is a critical c…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
When the Ruler is Broken: Parsing-Induced Suppression in LLM-Based Security Log Evaluation

arXiv:2605.07293v1 Announce Type: new Abstract: LLM-based SOC log classifiers are commonly evaluated using regular-expression pipelines that extract structured fields from free-form model output. We d…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Asymmetric Phase Coding Audio Watermarking

arXiv:2605.07241v1 Announce Type: new Abstract: The proliferation of deepfake audio challenges voice-based authentication systems; passive forensic detectors are sensitive to evolving generative model…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
TENNOR: Trustworthy Execution for Neural Networks through Obliviousness and Retrievals

arXiv:2605.07160v1 Announce Type: new Abstract: Training wide neural networks on sensitive data in untrusted cloud environments requires simultaneously achieving computational efficiency and rigorous …

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Demystifying and Detecting Agentic Workflow Injection Vulnerabilities in GitHub Actions

arXiv:2605.07135v1 Announce Type: new Abstract: GitHub Actions is increasingly used to deploy LLM-based agents for repository-centric tasks such as issue triage, pull-request review, code modification…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Membership Inference Attacks on Vision-Language-Action Models

arXiv:2605.07088v1 Announce Type: new Abstract: Membership inference attacks (MIAs) have been extensively studied in large language models (LLMs) and vision-language models (VLMs), yet their implicati…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Beyond the Wrapper: Identifying Artifact Reliance in Static Malware Classifiers using TRUSTEE

arXiv:2605.07034v1 Announce Type: new Abstract: Modern cybersecurity relies heavily on static machine-learning-based malware classifiers. However, transformations such as packing and other non-semanti…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Pomegranate: A Lightweight Compartmentalization Architecture using Virtualization Extensions

arXiv:2605.07008v1 Announce Type: new Abstract: The monolithic nature of widely used commodity operating systems means that vulnerabilities in one software component potentially compromise the entire …

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Aquaman: A Transparent Proxy Architecture for Quantum Resilient Key Establishment

arXiv:2605.06932v1 Announce Type: new Abstract: The harvest-now, decrypt-later (HNDL) threat--adversaries intercepting and archiving ciphertext today for retrospective decryption once quantum computer…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Benchmarking Large Language Models for IoC Recovery under Adversarial Code Obfuscation and Encryption

arXiv:2605.06910v1 Announce Type: new Abstract: Software obfuscation and encryption present persistent challenges for program comprehension and security analysis, particularly when adversaries conceal…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
McNdroid: A Longitudinal Multimodal Benchmark for Robust Drift Detection in Android Malware

arXiv:2605.06894v1 Announce Type: new Abstract: Machine learning (ML) in real-world systems must contend with concept drift, adversarial actors, and a spectrum of potential features with varying costs…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Zombies in Alternate Realities: The Afterlife of Domain Names in DNS Integrations

arXiv:2605.06880v1 Announce Type: new Abstract: DNS integrations leverage the discovery, trust, and uniqueness of the global Domain Name System with a linkage to another naming ecosystem, so the DNS n…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
The Cost of Quantum Resistance: A Hash-Based Commit-Reveal Alternative for Minimizing Blockchain Infrastructure Overhead

arXiv:2605.06853v1 Announce Type: new Abstract: The transition to post-quantum cryptography in blockchain systems such as Bitcoin and Ethereum is often framed as a purely cryptographic problem. In pra…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Narrow Secret Loyalty Dodges Black-Box Audits

arXiv:2605.06846v1 Announce Type: new Abstract: Recent work identifies secret loyalties as a distinct threat from standard backdoors. A secret loyalty causes a model to covertly advance the interests …

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
PAMPOS: Causal Transformer-based Trajectory Prediction for Attack-Agnostic Misbehavior Detection in V2X Networks

arXiv:2605.06833v1 Announce Type: new Abstract: Misbehavior detection in Vehicle-to-Everything (V2X) networks is a second line of defense against insider falsification attacks that cryptographic mecha…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
Language Models Can Autonomously Hack and Self-Replicate

arXiv:2605.06760v1 Announce Type: new Abstract: We demonstrate that language models can autonomously replicate their weights and harness across a network by exploiting vulnerable hosts. The agent inde…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
A UEFI System with SPDM to Protect Against Unauthorized Device Connections

arXiv:2605.06744v1 Announce Type: new Abstract: Attackers willing to compromise computing systems can use malicious peripherals as an attack vector, threatening users that cannot verify the hardware's…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
From Specification to Deployment: Empirical Evidence from a W3C VC + DID Trust Infrastructure for Autonomous Agents

arXiv:2605.06738v1 Announce Type: new Abstract: Autonomous AI agents now transact at production scale -- 69,000 bots executing 165 million transactions across 50 million USDC in cumulative volume on a…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
When Routine Chats Turn Toxic: Unintended Long-Term State Poisoning in Personalized Agents

arXiv:2605.06731v1 Announce Type: new Abstract: Personalized LLM agents maintain persistent cross-session state to support long-horizon collaboration. Yet, this persistence introduces a subtle but cri…

arXiv Security Read →
◬ AI & Machine Learning May 11, 2026
TUANDROMD-X: Advanced Entropy and Visual Analytics Dataset for Enhanced Malware Detection and Classification

arXiv:2605.06718v1 Announce Type: new Abstract: Malware and malware-based attacks are becoming more prevalent and complex. Attackers regularly come up with new techniques that have the ability to evad…

arXiv Security Read →
← Prev 12 / 112 Next →