CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2928 articles  ·  updated every 4 hours · grows forever

2928Total
2883Full Text
May 21, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning
Bringing the power of Personal Intelligence to more people

We're expanding Personal Intelligence across AI Mode in Search, the Gemini app and Gemini in Chrome.

Google AI Read →
◬ AI & Machine Learning
Our latest investment in open source security for the AI era

Google is making new investments, building new tools and developing code security to improve open source security.

Google AI Read →
◬ AI & Machine Learning
State of Open Source on Hugging Face: Spring 2026
Hugging Face Read →
◬ AI & Machine Learning
New RFP on Interpretability from Schmidt Sciences

Request for Proposals Deadline: Tuesday, May 26, 2026 Schmidt Sciences invites proposals for a pilot program in AI interpretability. We seek new methods for detecting and mitigating deceptive behavior…

AI Alignment Forum Read →
◬ AI & Machine Learning
Nemotron 3 Nano 4B: A Compact Hybrid Model for Efficient Local AI
Hugging Face Read →
◬ AI & Machine Learning
The Pentagon is planning for AI companies to train on classified data, defense official says

The Pentagon is discussing plans to set up secure environments for generative AI companies to train military-specific versions of their models on classified data, MIT Technology Review has learned. AI…

MIT Tech Review AI Read →
◬ AI & Machine Learning
Quantum Key Distribution Secured Federated Learning for Channel Estimation and Radar Spectrum Sensing in 6G Networks

arXiv:2603.15649v1 Announce Type: new Abstract: This paper presents a federated learning framework secured by quantum key distribution (QKD) for wireless channel estimation and radar spectrum sensing …

arXiv Security Read →
◬ AI & Machine Learning
IdentityGuard: Context-Aware Restriction and Provenance for Personalized Synthesis

arXiv:2603.15679v1 Announce Type: new Abstract: The nature of personalized text-to-image models poses a unique safety challenge that generic context-blind methods are ill-equipped to handle. Such glob…

arXiv Security Read →
◬ AI & Machine Learning
State-Dependent Safety Failures in Multi-Turn Language Model Interaction

arXiv:2603.15684v1 Announce Type: new Abstract: Safety alignment in large language models is typically evaluated under isolated queries, yet real-world use is inherently multi-turn. Although multi-tur…

arXiv Security Read →
◬ AI & Machine Learning
BadLLM-TG: A Backdoor Defender powered by LLM Trigger Generator

arXiv:2603.15692v1 Announce Type: new Abstract: Backdoor attacks compromise model reliability by using triggers to manipulate outputs. Trigger inversion can accurately locate these triggers via a gene…

arXiv Security Read →
◬ AI & Machine Learning
Remarks on the Relevance of Privacy Expectations for Default Opt-out Settings

arXiv:2603.15705v1 Announce Type: new Abstract: Over the past few years an increasing number of states in the US have adopted new privacy laws. The majority of these laws require compliance with unive…

arXiv Security Read →
◬ AI & Machine Learning
How Vulnerable Are AI Agents to Indirect Prompt Injections? Insights from a Large-Scale Public Competition

arXiv:2603.15714v1 Announce Type: new Abstract: LLM based agents are increasingly deployed in high stakes settings where they process external data sources such as emails, documents, and code reposito…

arXiv Security Read →
◬ AI & Machine Learning
Grant, Verify, Revoke: A User-Centric Pattern for Blockchain Compliance

arXiv:2603.15721v1 Announce Type: new Abstract: In decentralized web applications, users face an inherent conflict between public verifiability and personal privacy. To participate in regulated on-cha…

arXiv Security Read →
◬ AI & Machine Learning
ClawWorm: Self-Propagating Attacks Across LLM Agent Ecosystems

arXiv:2603.15727v1 Announce Type: new Abstract: Autonomous LLM-based agents increasingly operate as long-running processes forming densely interconnected multi-agent ecosystems, whose security propert…

arXiv Security Read →
◬ AI & Machine Learning
Do Not Leave a Gap: Hallucination-Free Object Concealment in Vision-Language Models

arXiv:2603.15940v1 Announce Type: new Abstract: Vision-language models (VLMs) have recently shown remarkable capabilities in visual understanding and generation, but remain vulnerable to adversarial m…

arXiv Security Read →
◬ AI & Machine Learning
Cross-Scale Persistence Analysis of EM Side-Channels for Reference-Free Detection of Always-On Hardware Trojans

arXiv:2603.16058v1 Announce Type: new Abstract: Always-on hardware Trojans pose a serious challenge to integrated circuit trust, as they remain active during normal operation and are difficult to dete…

arXiv Security Read →
◬ AI & Machine Learning
Resource Consumption Threats in Large Language Models

arXiv:2603.16068v1 Announce Type: new Abstract: Given limited and costly computational infrastructure, resource efficiency is a key requirement for large language models (LLMs). Efficient LLMs increas…

arXiv Security Read →
◬ AI & Machine Learning
Ciphertext-Policy ABE for $\mathsf{NC}^1$ Circuits with Constant-Size Ciphertexts from Succinct LWE

arXiv:2603.16117v1 Announce Type: new Abstract: We construct a lattice-based ciphertext-policy attribute-based encryption (CP-ABE) scheme for $\mathsf{NC}^1$ access policies with constant-size ciphert…

arXiv Security Read →
◬ AI & Machine Learning
Novel CRT-based Asymptotically Ideal Disjunctive Hierarchical Secret Sharing Scheme

arXiv:2603.16267v1 Announce Type: new Abstract: Disjunctive Hierarchical Secret Sharing (DHSS)} scheme is a type of secret sharing scheme in which the set of all participants is partitioned into disjo…

arXiv Security Read →
◬ AI & Machine Learning
Systematization of Knowledge: The Design Space of Digital Payment Systems with Potential for CBDC

arXiv:2603.16320v1 Announce Type: new Abstract: Central Bank Digital Currencies (CBDCs) are proposed as a public response to the uptake of privately run digital payments, with the digital euro, under …

arXiv Security Read →
◬ AI & Machine Learning
Detecting Sentiment Steering Attacks on RAG-enabled Large Language Models

arXiv:2603.16342v1 Announce Type: new Abstract: The proliferation of large-scale IoT networks has been both a blessing and a curse. Not only has it revolutionized the way organizations operate by incr…

arXiv Security Read →
◬ AI & Machine Learning
SseRex: Practical Symbolic Execution of Solana Smart Contracts

arXiv:2603.16349v1 Announce Type: new Abstract: Solana is rapidly gaining traction among smart contract developers and users. However, its growing adoption has been accompanied by a series of major se…

arXiv Security Read →
◬ AI & Machine Learning
Impact of File-Open Hook Points on Backup Ratio in ROFBS on XFS

arXiv:2603.16364v1 Announce Type: new Abstract: Ransomware continues encrypting files during the delay between attack onset and detection. ROFBS mitigates this problem by backing up pre-modification f…

arXiv Security Read →
◬ AI & Machine Learning
Rotated Robustness: A Training-Free Defense against Bit-Flip Attacks on Large Language Models

arXiv:2603.16382v1 Announce Type: new Abstract: Hardware faults, specifically bit-flips in quantized weights, pose a severe reliability threat to Large Language Models (LLMs), often triggering catastr…

arXiv Security Read →
← Prev 120 / 122 Next →