CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2687 articles  ·  updated every 4 hours · grows forever

2687Total
2646Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 23, 2026
Introducing mrva, a terminal-first approach to CodeQL multi-repo variant analysis

In 2023 GitHub introduced CodeQL multi-repository variant analysis (MRVA). This functionality lets you run queries across thousands of projects using pre-built databases and drastically reduces the ti…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Catching malicious package releases using a transparency log

We’re getting Sigstore’s rekor-monitor ready for production use, making it easier for developers to detect tampering and unauthorized uses of their identities in the Rekor transparency log. This work,…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Use GWP-ASan to detect exploits in production environments

Memory safety bugs like use-after-free and buffer overflows remain among the most exploited vulnerability classes in production software. While AddressSanitizer (ASan) excels at catching these bugs du…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Can chatbots craft correct code?

I recently attended the AI Engineer Code Summit in New York, an invite-only gathering of AI leaders and engineers. One theme emerged repeatedly in conversations with attendees building with AI: the be…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Detect Go’s silent arithmetic bugs with go-panikint

Go’s arithmetic operations on standard integer types are silent by default, meaning overflows “wrap around” without panicking. This behavior has hidden an entire class of security vulnerabilities from…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Lack of isolation in agentic browsers resurfaces old vulnerabilities

With browser-embedded AI agents, we’re essentially starting the security journey over again. We exploited a lack of isolation mechanisms in multiple agentic browsers to perform attacks ranging from th…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Building cryptographic agility into Sigstore

Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic signature protecting it may become untrustw…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Celebrating our 2025 open-source contributions

Last year, our engineers submitted over 375 pull requests that were merged into non–Trail of Bits repositories, touching more than 90 projects from cryptography libraries to the Rust compiler. This wo…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Carelessness versus craftsmanship in cryptography

Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of downstrea…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Using threat modeling and prompt injection to audit Comet

Before launching their Comet browser, Perplexity hired us to test the security of their AI-powered browsing features. Using adversarial testing guided by our TRAIL threat model, we demonstrated how fo…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
mquire: Linux memory forensics without external dependencies

If you’ve ever done Linux memory forensics, you know the frustration: without debug symbols that match the exact kernel version, you’re stuck. These symbols aren’t typically installed on production sy…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Six mistakes in ERC-4337 smart accounts

Account abstraction transforms fixed “private key can do anything” models into programmable systems that enable batching, recovery and spending limits, and flexible gas payment. But that programmabili…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Spotting issues in DeFi with dimensional analysis

Using dimensional analysis, you can categorically rule out a whole category of logic and arithmetic bugs that plague DeFi formulas. No code changes required, just better reasoning! One of the first le…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Try our new dimensional analysis Claude plugin

We’re releasing a new Claude plugin for developing and auditing code that implements dimensional analysis, a technique we explored in our most recent blog post . Most LLM-based security skills ask the…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
How we made Trail of Bits AI-native (so far)

This post is adapted from a talk I gave at [un]prompted , the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or downl…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Mutation testing for the agentic era

Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measures execution, not verification. Test suite…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Simplifying MBA obfuscation with CoBRA

Mixed Boolean-Arithmetic (MBA) obfuscation disguises simple operations like x + y behind tangles of arithmetic and bitwise operators. Malware authors and software protectors rely on it because no stan…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
What we learned about TEE security from auditing WhatsApp's Private Inference

WhatsApp’s new “Private Inference” feature represents one of the most ambitious attempts to combine end-to-end encryption with AI-powered capabilities, such as message summarization. To make this poss…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Master C and C++ with our new Testing Handbook chapter

We added a new chapter to our Testing Handbook: a comprehensive security checklist for C and C++ code . We’ve identified a broad range of common bug classes, known footguns, and API gotchas across C a…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
We beat Google’s zero-knowledge proof of quantum cryptanalysis

Two weeks ago, Google’s Quantum AI group published a zero-knowledge proof of a quantum circuit so optimized, they concluded that first-generation quantum computers will break elliptic curve cryptograp…

Trail of Bits Read →
◬ AI & Machine Learning Apr 23, 2026
Five approaches to evaluating training-based control measures

Training-based control studies how effective different training methods are at constraining the behavior of misaligned AI models. A central example of a case where we want to control AI models is in d…

AI Alignment Forum Read →
◬ AI & Machine Learning Apr 23, 2026
5 Cybersecurity Stocks Most Likely to Benefit as AI Threats Drive Budget Increases in 2026 - 24/7 Wall St.

5 Cybersecurity Stocks Most Likely to Benefit as AI Threats Drive Budget Increases in 2026 24/7 Wall St.

24/7 Wall St. Read →
◬ AI & Machine Learning Apr 22, 2026
Qwen3.6-27B: Flagship-Level Coding in a 27B Dense Model

Qwen3.6-27B: Flagship-Level Coding in a 27B Dense Model Big claims from Qwen about their latest open weight model: Qwen3.6-27B delivers flagship-level agentic coding performance, surpassing the previo…

Simon Willison Read →
◬ AI & Machine Learning Apr 22, 2026
Gemma 4 VLA Demo on Jetson Orin Nano Super
Hugging Face Read →
← Prev 25 / 112 Next →