CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2756 articles  ·  updated every 4 hours · grows forever

2756Total
2714Full Text
May 18, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 03, 2026
From Component Manipulation to System Compromise: Understanding and Detecting Malicious MCP Servers

arXiv:2604.01905v1 Announce Type: new Abstract: The model context protocol (MCP) standardizes how LLMs connect to external tools and data sources, enabling faster integration but introducing new attac…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Combating Data Laundering in LLM Training

arXiv:2604.01904v1 Announce Type: new Abstract: Data rights owners can detect unauthorized data use in large language model (LLM) training by querying with proprietary samples. Often, superior perform…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Topology-Hiding Connectivity-Assurance for QKD Inter-Networking

arXiv:2604.01876v1 Announce Type: new Abstract: While QKD ensures information-theoretic security at the link level, real-world deployments depend on trusted repeaters, creating potential vulnerabiliti…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Spike-PTSD: A Bio-Plausible Adversarial Example Attack on Spiking Neural Networks via PTSD-Inspired Spike Scaling

arXiv:2604.01750v1 Announce Type: new Abstract: Spiking Neural Networks (SNNs) are energy-efficient and biologically plausible, ideal for embedded and security-critical systems, yet their adversarial …

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Contextualizing Sink Knowledge for Java Vulnerability Discovery

arXiv:2604.01645v1 Announce Type: new Abstract: Java applications are prone to vulnerabilities stemming from the insecure use of security-sensitive APIs, such as file operations enabling path traversa…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Seclens: Role-specific Evaluation of LLM's for security vulnerablity detection

arXiv:2604.01637v1 Announce Type: new Abstract: Existing benchmarks for LLM-based vulnerability detection compress model performance into a single metric, which fails to reflect the distinct prioritie…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Diffusion-Guided Adversarial Perturbation Injection for Generalizable Defense Against Facial Manipulations

arXiv:2604.01635v1 Announce Type: new Abstract: Recent advances in GAN and diffusion models have significantly improved the realism and controllability of facial deepfake manipulation, raising serious…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
RefinementEngine: Automating Intent-to-Device Filtering Policy Deployment under Network Constraints

arXiv:2604.01627v1 Announce Type: new Abstract: Translating security intent into deployable network enforcement rules and maintaining their effectiveness despite evolving cyber threats remains a large…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Assertain: Automated Security Assertion Generation Using Large Language Models

arXiv:2604.01583v1 Announce Type: new Abstract: The increasing complexity of modern system-on-chip designs amplifies hardware security risks and makes manual security property specification a major bo…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
AI-Assisted Hardware Security Verification: A Survey and AI Accelerator Case Study

arXiv:2604.01572v1 Announce Type: new Abstract: As hardware systems grow in complexity, security verification must keep up with them. Recently, artificial intelligence (AI) and large language models (…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
EXHIB: A Benchmark for Realistic and Diverse Evaluation of Function Similarity in the Wild

arXiv:2604.01554v1 Announce Type: new Abstract: Binary Function Similarity Detection (BFSD) is a core problem in software security, supporting tasks such as vulnerability analysis, malware classificat…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
SelfGrader: Stable Jailbreak Detection for Large Language Models using Token-Level Logits

arXiv:2604.01473v1 Announce Type: new Abstract: Large Language Models (LLMs) are powerful tools for answering user queries, yet they remain highly vulnerable to jailbreak attacks. Existing guardrail m…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Preserving Target Distributions With Differentially Private Count Mechanisms

arXiv:2604.01468v1 Announce Type: new Abstract: Differentially private mechanisms are increasingly used to publish tables of counts, where each entry represents the number of individuals belonging to …

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Cooking Up Risks: Benchmarking and Reducing Food Safety Risks in Large Language Models

arXiv:2604.01444v1 Announce Type: new Abstract: Large language models (LLMs) are increasingly deployed for everyday tasks, including food preparation and health-related guidance. However, food safety …

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
"The System Will Choose Security Over Humanity Every Time": Understanding Security and Privacy for U.S. Incarcerated Users

arXiv:2604.01370v1 Announce Type: new Abstract: Digital devices like tablets, media players, and kiosks are increasingly deployed in U.S. prisons. These technologies can enable incarcerated people to …

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Safety, Security, and Cognitive Risks in World Models

arXiv:2604.01346v1 Announce Type: new Abstract: World models -- learned internal simulators of environment dynamics -- are rapidly becoming foundational to autonomous decision-making in robotics, auto…

arXiv Security Read →
◬ AI & Machine Learning Apr 03, 2026
Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries - The Hacker News

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries The Hacker News

The Hacker News Read →
◬ AI & Machine Learning Apr 03, 2026
The Agentic AI Shift That Exposes Every Cyber Security Gap - Cybersecurity Insiders

The Agentic AI Shift That Exposes Every Cyber Security Gap Cybersecurity Insiders

Cybersecurity Insiders Read →
◬ AI & Machine Learning Apr 02, 2026
Highlights from my conversation about agentic engineering on Lenny's Podcast

I was a guest on Lenny Rachitsky's podcast, in a new episode titled An AI state of the union: We've passed the inflection point, dark factories are coming, and automation timelines . It's available on…

Simon Willison Read →
◬ AI & Machine Learning Apr 02, 2026
Welcome Gemma 4: Frontier multimodal intelligence on device
Hugging Face Read →
◬ AI & Machine Learning Apr 02, 2026
Create, edit and share videos at no cost in Google Vids

New AI capabilities are coming to Google Vids, powered by Lyria 3 and Veo 3.1, like high-quality video generation at no cost and more.

Google AI Read →
◬ AI & Machine Learning Apr 02, 2026
New ways to balance cost and reliability in the Gemini API

Google is introducing two new inference tiers to the Gemini API, Flex and Priority, to balance cost and latency.

Google AI Read →
◬ AI & Machine Learning Apr 02, 2026
Gemma 4: Byte for byte, the most capable open models

Gemma 4: Byte for byte, the most capable open models Four new vision-capable Apache 2.0 licensed reasoning LLMs from Google DeepMind, sized at 2B, 4B, 31B, plus a 26B-A4B Mixture-of-Experts. Google em…

Simon Willison Read →
◬ AI & Machine Learning Apr 02, 2026
llm-gemini 0.30

Release: llm-gemini 0.30 New models gemini-3.1-flash-lite-preview , gemma-4-26b-a4b-it and gemma-4-31b-it . See my notes on Gemma 4 . Tags: gemini , llm , gemma

Simon Willison Read →
← Prev 66 / 115 Next →