CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2750 articles  ·  updated every 4 hours · grows forever

2750Total
2710Full Text
May 18, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 09, 2026
Toward Reducing Unproductive Container Moves: Predicting Service Requirements and Dwell Times

arXiv:2604.06251v1 Announce Type: new Abstract: This article presents the results of a data science study conducted at a container terminal, aimed at reducing unproductive container moves through the …

arXiv AI Read →
◬ AI & Machine Learning Apr 09, 2026
Blind Refusal: Language Models Refuse to Help Users Evade Unjust, Absurd, and Illegitimate Rules

arXiv:2604.06233v1 Announce Type: new Abstract: Safety-trained language models routinely refuse requests for help circumventing rules. But not all rules deserve compliance. When users ask for help eva…

arXiv AI Read →
◬ AI & Machine Learning Apr 09, 2026
High-Precision Estimation of the State-Space Complexity of Shogi via the Monte Carlo Method

arXiv:2604.06189v1 Announce Type: new Abstract: Determining the state-space complexity of the game of Shogi (Japanese Chess) has been a challenging problem, with previous combinatorial estimates leavi…

arXiv AI Read →
◬ AI & Machine Learning Apr 09, 2026
SkillTrojan: Backdoor Attacks on Skill-Based Agent Systems

arXiv:2604.06811v1 Announce Type: new Abstract: Skill-based agent systems tackle complex tasks by composing reusable skills, improving modularity and scalability while introducing a largely unexamined…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
ARuleCon: Agentic Security Rule Conversion

arXiv:2604.06762v1 Announce Type: new Abstract: Security Information and Event Management (SIEM) systems make it possible for detecting intrusion anomalies in real-time manner by their applied securit…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Understanding Data Collection, Brokerage, and Spam in the Lead Marketing Ecosystem

arXiv:2604.06759v1 Announce Type: new Abstract: The lead marketing ecosystem enables collection, sale, and use of personal data submitted via web forms to deliver personalized quotes in high-value ver…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Turn Your Face Into An Attack Surface: Screen Attack Using Facial Reflections in Video Conferencing

arXiv:2604.06729v1 Announce Type: new Abstract: In video conferencing, human faces serve as the primary visual focal points, playing multifaceted roles that enhance visual communication and emotional …

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Broken Quantum: A Systematic Formal Verification Study of Security Vulnerabilities Across the Open-Source Quantum Computing Simulator Ecosystem

arXiv:2604.06712v1 Announce Type: new Abstract: Quantum computing simulators form the classical software foundation on which virtually all quantum algorithm research depends. We present Broken Quantum…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Aegon: Auditable AI Content Access with Ledger-Bound Tokens and Hardware-Attested Mobile Receipts

arXiv:2604.06693v1 Announce Type: new Abstract: Recent standards such as RSL address AI content policy declaration -- telling AI systems what the licensing terms are. However, no existing system provi…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
RPM-Net Reciprocal Point MLP Network for Unknown Network Security Threat Detection

arXiv:2604.06638v1 Announce Type: new Abstract: Effective detection of unknown network security threats in multi-class imbalanced environments is critical for maintaining cyberspace security. Current …

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection

arXiv:2604.06633v1 Announce Type: new Abstract: Recent advancements in Large Language Models (LLMs) have sparked interest in their application to Static Application Security Testing (SAST), primarily …

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
PoC-Adapt: Semantic-Aware Automated Vulnerability Reproduction with LLM Multi-Agents and Reinforcement Learning-Driven Adaptive Policy

arXiv:2604.06618v1 Announce Type: new Abstract: While recent approaches leverage large language models (LLMs) and multi-agent pipelines to automatically generate proof-of-concept (PoC) exploits from v…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box Threats

arXiv:2604.06599v1 Announce Type: new Abstract: Concept drift and adversarial evasion are two major challenges for deploying machine learning-based malware detectors. While both have been studied sepa…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
SkillSieve: A Hierarchical Triage Framework for Detecting Malicious AI Agent Skills

arXiv:2604.06550v1 Announce Type: new Abstract: OpenClaw's ClawHub marketplace hosts over 13,000 community-contributed agent skills, and between 13% and 26% of them contain security vulnerabilities ac…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Guiding Symbolic Execution with Static Analysis and LLMs for Vulnerability Discovery

arXiv:2604.06506v1 Announce Type: new Abstract: Symbolic execution detects vulnerabilities with precision, but applying it to large codebases requires harnesses that set up symbolic state, model depen…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
The Defense Trilemma: Why Prompt Injection Defense Wrappers Fail?

arXiv:2604.06436v1 Announce Type: new Abstract: We prove that no continuous, utility-preserving wrapper defense-a function $D: X\to X$ that preprocesses inputs before the model sees them-can make all …

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Towards Resilient Intrusion Detection in CubeSats: Challenges, TinyML Solutions, and Future Directions

arXiv:2604.06411v1 Announce Type: new Abstract: CubeSats have revolutionized access to space by providing affordable and accessible platforms for research and education. However, their reliance on Com…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Say Something Else: Rethinking Contextual Privacy as Information Sufficiency

arXiv:2604.06409v1 Announce Type: new Abstract: LLM agents increasingly draft messages on behalf of users, yet users routinely overshare sensitive information and disagree on what counts as private. E…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
WebSP-Eval: Evaluating Web Agents on Website Security and Privacy Tasks

arXiv:2604.06367v1 Announce Type: new Abstract: Web agents automate browser tasks, ranging from simple form completion to complex workflows like ordering groceries. While current benchmarks evaluate g…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Blockchain and AI: Securing Intelligent Networks for the Future

arXiv:2604.06323v1 Announce Type: new Abstract: The rapid evolution of intelligent networks under the Internet of Everything (IoE) paradigm is transforming connectivity by integrating people, processe…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
FedSpy-LLM: Towards Scalable and Generalizable Data Reconstruction Attacks from Gradients on LLMs

arXiv:2604.06297v1 Announce Type: new Abstract: Given the growing reliance on private data in training Large Language Models (LLMs), Federated Learning (FL) combined with Parameter-Efficient Fine-Tuni…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Adversarial Robustness of Time-Series Classification for Crystal Collimator Alignment

arXiv:2604.06289v1 Announce Type: new Abstract: In this paper, we analyze and improve the adversarial robustness of a convolutional neural network (CNN) that assists crystal-collimator alignment at CE…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
Harnessing Hyperbolic Geometry for Harmful Prompt Detection and Sanitization

arXiv:2604.06285v1 Announce Type: new Abstract: Vision-Language Models (VLMs) have become essential for tasks such as image synthesis, captioning, and retrieval by aligning textual and visual informat…

arXiv Security Read →
◬ AI & Machine Learning Apr 09, 2026
ClawLess: A Security Model of AI Agents

arXiv:2604.06284v1 Announce Type: new Abstract: Autonomous AI agents powered by Large Language Models can reason, plan, and execute complex tasks, but their ability to autonomously retrieve informatio…

arXiv Security Read →
← Prev 54 / 115 Next →