CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2756 articles  ·  updated every 4 hours · grows forever

2756Total
2714Full Text
May 18, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 02, 2026
AutoMIA: Improved Baselines for Membership Inference Attack via Agentic Self-Exploration

arXiv:2604.01014v1 Announce Type: new Abstract: Membership Inference Attacks (MIAs) serve as a fundamental auditing tool for evaluating training data leakage in machine learning models. However, exist…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Do Phone-Use Agents Respect Your Privacy?

arXiv:2604.00986v1 Announce Type: new Abstract: We study whether phone-use agents respect privacy while completing benign mobile tasks. This question has remained hard to answer because privacy-compli…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
AutoEG: Exploiting Known Third-Party Vulnerabilities in Black-Box Web Applications

arXiv:2604.00704v1 Announce Type: new Abstract: Large-scale web applications are widely deployed with complex third-party components, inheriting security risks arising from component vulnerabilities. …

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
When Safe Models Merge into Danger: Exploiting Latent Vulnerabilities in LLM Fusion

arXiv:2604.00627v1 Announce Type: new Abstract: Model merging has emerged as a powerful technique for combining specialized capabilities from multiple fine-tuned LLMs without additional training costs…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Quantum-Safe Code Auditing: LLM-Assisted Static Analysis and Quantum-Aware Risk Scoring for Post-Quantum Cryptography Migration

arXiv:2604.00560v1 Announce Type: new Abstract: The impending arrival of cryptographically relevant quantum computers (CRQCs) threatens the security foundations of modern software: Shor's algorithm br…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Lightweight, Practical Encrypted Face Recognition with GPU Support

arXiv:2604.00546v1 Announce Type: new Abstract: Face recognition models operate in a client-server setting where a client extracts a compact face embedding and a server performs similarity search over…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Efficient DPF-based Error-Detecting Information-Theoretic Private Information Retrieval Over Rings

arXiv:2604.00411v1 Announce Type: new Abstract: Authenticated private information retrieval (APIR) is the state-of-the-art error-detecting private information retrieval (ED-PIR), using Distributed Poi…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
RAGShield: Provenance-Verified Defense-in-Depth Against Knowledge Base Poisoning in Government Retrieval-Augmented Generation Systems

arXiv:2604.00387v1 Announce Type: new Abstract: RAG systems deployed across federal agencies for citizen-facing services are vulnerable to knowledge base poisoning attacks, where adversaries inject ma…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Cybersecurity Risk Assessment for CubeSat Missions: Adapting Established Frameworks for Resource-Constrained Environments

arXiv:2604.00303v1 Announce Type: new Abstract: CubeSats have democratised access to space for universities, start-ups and emerging space nations, but the same design decisions that reduce cost and co…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
On the Necessity of Pre-agreed Secrets for Thwarting Last-minute Coercion: Vulnerabilities and Lessons From the Loki E-voting Protocol

arXiv:2604.00188v1 Announce Type: new Abstract: Coercion-resistance (CR) is a crucial security property in e-voting systems. It ensures that an attacker cannot compel a voter to vote in a specific way…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
NFC based inventory control system for secure and efficient communication

arXiv:2604.00181v1 Announce Type: new Abstract: This paper brings up this idea of using Near Field Communication (NFC) for inventory control system instead of using traditional barcodes. NFC because o…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Beyond Latency: A System-Level Characterization of MPC and FHE for PPML

arXiv:2604.00169v1 Announce Type: new Abstract: Privacy protection has become an increasing concern in modern machine learning applications. Privacy-preserving machine learning (PPML) has attracted gr…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Efficient Software Vulnerability Detection Using Transformer-based Models

arXiv:2604.00112v1 Announce Type: new Abstract: Detecting software vulnerabilities is critical to ensuring the security and reliability of modern computer systems. Deep neural networks have shown prom…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
When Labels Are Scarce: A Systematic Mapping of Label-Efficient Code Vulnerability Detection

arXiv:2604.00079v1 Announce Type: new Abstract: Machine-learning-based code vulnerability detection (CVD) has progressed rapidly, from deep program representations to pretrained code models and LLM-ce…

arXiv Security Read →
◬ AI & Machine Learning Apr 02, 2026
Cybercrime as a Service: A Scoping Review

arXiv:2604.00063v1 Announce Type: new Abstract: Cloud computing has drastically altered the ways in which it is possible to deliver information technologies in a service-led structure, however, this h…

arXiv Security Read →
◬ AI & Machine Learning Apr 01, 2026
datasette-llm 0.1a6

Release: datasette-llm 0.1a6 The same model ID no longer needs to be repeated in both the default model and allowed models lists - setting it as a default model automatically adds it to the allowed mo…

Simon Willison Read →
◬ AI & Machine Learning Apr 01, 2026
datasette-enrichments-llm 0.2a1

Release: datasette-enrichments-llm 0.2a1 The actor who triggers an enrichment is now passed to the llm.mode(... actor=actor) method. #3 Tags: enrichments , llm , datasette

Simon Willison Read →
◬ AI & Machine Learning Apr 01, 2026
Holo3: Breaking the Computer Use Frontier
Hugging Face Read →
◬ AI & Machine Learning Apr 01, 2026
Cybersecurity M&A Roundup: Cyber Giants Strengthen AI Security Offerings - Infosecurity Magazine

Cybersecurity M&A Roundup: Cyber Giants Strengthen AI Security Offerings Infosecurity Magazine

Infosecurity Magazine Read →
◬ AI & Machine Learning Apr 01, 2026
The latest AI news we announced in March 2026

Here are Google’s latest AI updates from March 2026

Google AI Read →
◬ AI & Machine Learning Apr 01, 2026
We’re creating a new satellite imagery map to help protect Brazil’s forests.

Google partnered with the Brazilian government on a satellite imagery map to help protect the country’s forests.

Google AI Read →
◬ AI & Machine Learning Apr 01, 2026
A CIO’s Playbook for Enterprise AI Deployment in 2026 and Beyond - Cybersecurity Insiders

A CIO’s Playbook for Enterprise AI Deployment in 2026 and Beyond Cybersecurity Insiders

Cybersecurity Insiders Read →
◬ AI & Machine Learning Apr 01, 2026
Predicting When RL Training Breaks Chain-of-Thought Monitorability

Crossposted from the DeepMind Safety Research Medium Blog . Read our full paper about this topic by Max Kaufmann, David Lindner, Roland S. Zimmermann, and Rohin Shah. Overseeing AI agents by reading t…

AI Alignment Forum Read →
◬ AI & Machine Learning Apr 01, 2026
The gig workers who are training humanoid robots at home

When Zeus, a medical student living in a hilltop city in central Nigeria, returns to his studio apartment from a long day at the hospital, he turns on his ring light, straps his iPhone to his forehead…

MIT Tech Review AI Read →
← Prev 69 / 115 Next →