CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2754 articles  ·  updated every 4 hours · grows forever

2754Total
2714Full Text
May 18, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 06, 2026
Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain

arXiv:2406.06958v2 Announce Type: replace Abstract: Online advertising relies on a complex and opaque supply chain that involves multiple stakeholders, including advertisers, publishers, and ad-networ…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Learning the Signature of Memorization in Autoregressive Language Models

arXiv:2604.03199v1 Announce Type: cross Abstract: All prior membership inference attacks for fine-tuned language models use hand-crafted heuristics (e.g., loss thresholding, Min-K\%, reference calibra…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
AutoVerifier: An Agentic Automated Verification Framework Using Large Language Models

arXiv:2604.02617v1 Announce Type: cross Abstract: Scientific and Technical Intelligence (S&TI) analysis requires verifying complex technical claims across rapidly growing literature, where existing ap…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Street-Legal Physical-World Adversarial Rim for License Plates

arXiv:2604.02457v1 Announce Type: cross Abstract: Automatic license plate reader (ALPR) systems are widely deployed to identify and track vehicles. While prior work has demonstrated vulnerabilities in…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Out-of-Domain Stress Test for Temporal Braid Group Privilege Escalation Detection

arXiv:2604.02366v1 Announce Type: cross Abstract: In a companion paper, we prove that the Burau-Lyapunov exponent LE discriminates focused from dispersed privilege escalation ratchets in cloud IAM gra…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
A Tsetlin Machine-driven Intrusion Detection System for Next-Generation IoMT Security

arXiv:2604.03205v1 Announce Type: new Abstract: The rapid adoption of the Internet of Medical Things (IoMT) is transforming healthcare by enabling seamless connectivity among medical devices, systems,…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
A Systematic Security Evaluation of OpenClaw and Its Variants

arXiv:2604.03131v1 Announce Type: new Abstract: Tool-augmented AI agents substantially extend the practical capabilities of large language models, but they also introduce security risks that cannot be…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
An Independent Safety Evaluation of Kimi K2.5

arXiv:2604.03121v1 Announce Type: new Abstract: Kimi K2.5 is an open-weight LLM that rivals closed models across coding, multimodal, and agentic benchmarks, but was released without an accompanying sa…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
AlertStar: Path-Aware Alert Prediction on Hyper-Relational Knowledge Graphs

arXiv:2604.03104v1 Announce Type: new Abstract: Cyber-attacks continue to grow in scale and sophistication, yet existing network intrusion detection approaches lack the semantic depth required for pat…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Supply-Chain Poisoning Attacks Against LLM Coding Agent Skill Ecosystems

arXiv:2604.03081v1 Announce Type: new Abstract: LLM-based coding agents extend their capabilities via third-party agent skills distributed through open marketplaces without mandatory security review. …

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Credential Leakage in LLM Agent Skills: A Large-Scale Empirical Study

arXiv:2604.03070v1 Announce Type: new Abstract: Third-party skills extend LLM agents with powerful capabilities but often handle sensitive credentials in privileged environments, making leakage risks …

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Analyzing Healthcare Interoperability Vulnerabilities: Formal Modeling and Graph-Theoretic Approach

arXiv:2604.03043v1 Announce Type: new Abstract: In a healthcare environment, the healthcare interoperability platforms based on HL7 FHIR allow concurrent, asynchronous access to a set of shared patien…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Towards Secure Agent Skills: Architecture, Threat Taxonomy, and Security Analysis

arXiv:2604.02837v1 Announce Type: new Abstract: Agent Skills is an emerging open standard that defines a modular, filesystem-based packaging format enabling LLM-based agents to acquire domain-specific…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Open Challenges for Secure and Scalable Wi-Fi Connectivity in Rural Areas

arXiv:2604.02774v1 Announce Type: new Abstract: Providing reliable, affordable, and secure Internet connectivity in rural areas remains a major challenge. Pay-for-use Wi-Fi hotspots are emerging as a …

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
ContractShield: Bridging Semantic-Structural Gaps via Hierarchical Cross-Modal Fusion for Multi-Label Vulnerability Detection in Obfuscated Smart Contracts

arXiv:2604.02771v1 Announce Type: new Abstract: Smart contracts are increasingly targeted by adversaries employing obfuscation techniques such as bogus code injection and control flow manipulation to …

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
SentinelAgent: Intent-Verified Delegation Chains for Securing Federal Multi-Agent AI Systems

arXiv:2604.02767v1 Announce Type: new Abstract: When Agent A delegates to Agent B, which invokes Tool C on behalf of User X, no existing framework can answer: whose authorization chain led to this act…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Poison Once, Exploit Forever: Environment-Injected Memory Poisoning Attacks on Web Agents

arXiv:2604.02623v1 Announce Type: new Abstract: Memory makes LLM-based web agents personalized, powerful, yet exploitable. By storing past interactions to personalize future tasks, agents inadvertentl…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
The Quantum-Cryptographic Co-evolution

arXiv:2604.02591v1 Announce Type: new Abstract: As quantum computing matures toward the realization of Cryptographically Relevant Quantum Computers (CRQC), global cryptographic infrastructure faces an…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Understanding the Effects of Safety Unalignment on Large Language Models

arXiv:2604.02574v1 Announce Type: new Abstract: Safety alignment has become a critical step to ensure LLMs refuse harmful requests while providing helpful and harmless responses. However, despite the …

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
From Theory to Practice: Code Generation Using LLMs for CAPEC and CWE Frameworks

arXiv:2604.02548v1 Announce Type: new Abstract: The increasing complexity and volume of software systems have heightened the importance of identifying and mitigating security vulnerabilities. The exis…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Opal: Private Memory for Personal AI

arXiv:2604.02522v1 Announce Type: new Abstract: Personal AI systems increasingly retain long-term memory of user activity, including documents, emails, messages, meetings, and ambient recordings. Trus…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Automated Malware Family Classification using Weighted Hierarchical Ensembles of Large Language Models

arXiv:2604.02490v1 Announce Type: new Abstract: Malware family classification remains a challenging task in automated malware analysis, particularly in real-world settings characterized by obfuscation…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Evolution and Perspectives of the Keep IT Secure Ecosystem:A Six-Year Analysis of Cybersecurity Experts Supporting Belgian SMEs

arXiv:2604.02425v1 Announce Type: new Abstract: The importance of cybersecurity for Small and Medium Enterprises (SMEs) has never been greater, especially given the rise of AI-driven threats. Supporti…

arXiv Security Read →
◬ AI & Machine Learning Apr 06, 2026
Backdoor Attacks on Decentralised Post-Training

arXiv:2604.02372v1 Announce Type: new Abstract: Decentralised post-training of large language models utilises data and pipeline parallelism techniques to split the data and the model. Unfortunately, d…

arXiv Security Read →
← Prev 63 / 115 Next →