CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2689 articles  ·  updated every 4 hours · grows forever

2689Total
2648Full Text
May 17, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 13, 2026
CLIP-Inspector: Model-Level Backdoor Detection for Prompt-Tuned CLIP via OOD Trigger Inversion

arXiv:2604.09101v1 Announce Type: new Abstract: Organisations with limited data and computational resources increasingly outsource model training to Machine Learning as a Service (MLaaS) providers, wh…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Conversations Risk Detection LLMs in Financial Agents via Multi-Stage Generative Rollout

arXiv:2604.09056v1 Announce Type: new Abstract: With the rapid adoption of large language models (LLMs) in financial service scenarios, dialogue security detection under high regulatory risk presents …

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Stringology-Based Cryptanalysis for EChaCha20 Stream Cipher

arXiv:2604.08862v1 Announce Type: new Abstract: Stringology-Based Cryptanalysis (SBC) offers a suitable and a structurally aligned approach for uncovering structural patterns in stream ciphers that tr…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Building Better Environments for Autonomous Cyber Defence

arXiv:2604.08805v1 Announce Type: new Abstract: In November 2025, the authors ran a workshop on the topic of what makes a good reinforcement learning (RL) environment for autonomous cyber defence (ACD…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Tracing the Chain: Deep Learning for Stepping-Stone Intrusion Detection

arXiv:2604.08800v1 Announce Type: new Abstract: Stepping-stone intrusions (SSIs) are a prevalent network evasion technique in which attackers route sessions through chains of compromised intermediate …

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Follow My Eyes: Backdoor Attacks on VLM-based Scanpath Prediction

arXiv:2604.08766v1 Announce Type: new Abstract: Scanpath prediction models forecast the sequence and timing of human fixations during visual search, driving foveated rendering and attention-based inte…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
RansomTrack: A Hybrid Behavioral Analysis Framework for Ransomware Detection

arXiv:2604.08739v1 Announce Type: new Abstract: Ransomware poses a serious and fast-acting threat to critical systems, often encrypting files within seconds of execution. Research indicates that ranso…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Why Network Segmentation Projects Fail

arXiv:2604.08632v1 Announce Type: new Abstract: Network segmentation is a foundational enterprise security control. Despite its recognized benefits, segmentation initiatives frequently fail in practic…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Realisation-Level Privacy Filtering

arXiv:2604.08630v1 Announce Type: new Abstract: We study differentially private data release, where a database is accessed through successive, possibly adaptive queries and mechanisms. Existing compos…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Retrieval Augmented Classification for Confidential Documents

arXiv:2604.08628v1 Announce Type: new Abstract: Unauthorized disclosure of confidential documents demands robust, low-leakage classification. In real work environments, there is a lot of inflow and ou…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Post-Quantum Cryptography-Based Bidirectional Authentication Key Exchange Protocol and Industry Applications: A Case Study of Instant Messaging

arXiv:2604.08612v1 Announce Type: new Abstract: This study aims to enhance the bidirectional authentication capability of ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism) by proposing the pos…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Semantic Intent Fragmentation: A Single-Shot Compositional Attack on Multi-Agent AI Pipelines

arXiv:2604.08608v1 Announce Type: new Abstract: We introduce Semantic Intent Fragmentation (SIF), an attack class against LLM orchestration systems where a single, legitimately phrased request causes …

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Self-Sovereign Agent

arXiv:2604.08551v1 Announce Type: new Abstract: We investigate the emerging prospect of self-sovereign agents -- AI systems that can economically sustain and extend their own operation without human i…

arXiv Security Read →
◬ AI & Machine Learning Apr 13, 2026
Quoting Bryan Cantrill

The problem is that LLMs inherently lack the virtue of laziness . Work costs nothing to an LLM. LLMs do not feel a need to optimize for their own (or anyone's) future time, and will happily dump more …

Simon Willison Read →
◬ AI & Machine Learning Apr 12, 2026
Gemma 4 audio with MLX

Thanks to a tip from Rahim Nathwani , here's a uv run recipe for transcribing an audio file on macOS using the 10.28 GB Gemma 4 E2B model with MLX and mlx-vlm : uv run --python 3.13 --with mlx_vlm --w…

Simon Willison Read →
◬ AI & Machine Learning Apr 12, 2026
Who's Hiring Cybersecurity Professionals in San Francisco, CA in 2026? - nucamp.co

Who's Hiring Cybersecurity Professionals in San Francisco, CA in 2026? nucamp.co

nucamp.co Read →
◬ AI & Machine Learning Apr 12, 2026
AI Security Compliance Trends That Will Define 2026 - AI CERTs

AI Security Compliance Trends That Will Define 2026 AI CERTs

AI CERTs Read →
◬ AI & Machine Learning Apr 11, 2026
SQLite 3.53.0

SQLite 3.53.0 SQLite 3.52.0 was withdrawn so this is a pretty big release with a whole lot of accumulated user-facing and internal improvements. Some that stood out to me: ALTER TABLE can now add and …

Simon Willison Read →
◬ AI & Machine Learning Apr 11, 2026
SQLite Query Result Formatter Demo

Tool: SQLite Query Result Formatter Demo See my notes on SQLite 3.53.0 . This playground provides a UI for trying out the various rendering options for SQL result tables from the new Query Result Form…

Simon Willison Read →
◬ AI & Machine Learning Apr 10, 2026
Kākāpō parrots

Lenny posted another snippet from our 1 hour 40 minute podcast recording and it's about kākāpō parrots! Tags: kakapo

Simon Willison Read →
◬ AI & Machine Learning Apr 10, 2026
ChatGPT voice mode is a weaker model

I think it's non-obvious to many people that the OpenAI voice mode runs on a much older, much weaker model - it feels like the AI that you can talk to should be the smartest AI but it really isn't. If…

Simon Willison Read →
◬ AI & Machine Learning Apr 10, 2026
Key AI Development Solutions for Cybersecurity in 2026 - CyberSecurityNews

Key AI Development Solutions for Cybersecurity in 2026 CyberSecurityNews

CyberSecurityNews Read →
◬ AI & Machine Learning Apr 10, 2026
ACF: A Collaborative Framework for Agent Covert Communication under Cognitive Asymmetry

arXiv:2604.08276v1 Announce Type: cross Abstract: As generative artificial intelligence evolves, autonomous agent networks present a powerful paradigm for interactive covert communication. However, be…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Efficient Provably Secure Linguistic Steganography via Range Coding

arXiv:2604.08052v1 Announce Type: cross Abstract: Linguistic steganography involves embedding secret messages within seemingly innocuous texts to enable covert communication. Provable security, which …

arXiv Security Read →
← Prev 48 / 113 Next →