CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2828 articles  ·  updated every 4 hours · grows forever

2828Total
2785Full Text
May 19, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Mar 31, 2026
FedFG: Privacy-Preserving and Robust Federated Learning via Flow-Matching Generation

arXiv:2603.27986v1 Announce Type: new Abstract: Federated learning (FL) enables distributed clients to collaboratively train a global model using local private data. Nevertheless, recent studies show …

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Adversarial Attacks on Multimodal Large Language Models: A Comprehensive Survey

arXiv:2603.27918v1 Announce Type: new Abstract: Multimodal large language models (MLLMs) integrate information from multiple modalities such as text, images, audio, and video, enabling complex capabil…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Decentralized Proof-of-Location for Content Provenance: Towards Capture-Time Authenticity

arXiv:2603.27883v1 Announce Type: new Abstract: Reliable use of real-world data requires confidence that recorded evidence reflects what actually occurred at the moment of capture. In adversarial or i…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Ordering Power is Sanctioning Power: Sanction Evasion-MEV and the Limits of On-Chain Enforcement

arXiv:2603.27739v1 Announce Type: new Abstract: Centralized stablecoins such as USDT and USDC enforce financial sanctions through contract-layer blacklist functions, yet on public blockchains a freeze…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
A Systematic Taxonomy of Security Vulnerabilities in the OpenClaw AI Agent Framework

arXiv:2603.27517v1 Announce Type: new Abstract: AI agent frameworks connecting large language model (LLM) reasoning to host execution surfaces--shell, filesystem, containers, and messaging--introduce …

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Attacking AI Accelerators by Leveraging Arithmetic Properties of Addition

arXiv:2603.27439v1 Announce Type: new Abstract: The dependability of AI models relies largely on the reliability of the underlying computation hardware. Hardware aging attacks can compromise the compu…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Context-Aware Phishing Email Detection Using Machine Learning and NLP

arXiv:2603.27326v1 Announce Type: new Abstract: Phishing attacks remain among the most prevalent cybersecurity threats, causing significant financial losses for individuals and organizations worldwide…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
"Elementary, My Dear Watson." Detecting Malicious Skills via Neuro-Symbolic Reasoning across Heterogeneous Artifacts

arXiv:2603.27204v1 Announce Type: new Abstract: Skills are increasingly used to extend LLM agents by packaging prompts, code, and configurations into reusable modules. As public registries and marketp…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Attacks on Sparse LWE and Sparse LPN with new Sample-Time tradeoffs

arXiv:2603.27190v1 Announce Type: new Abstract: This paper extends the Kikuchi method to give algorithms for decisional $k$-sparse Learning With Errors (LWE) and $k$-sparse Learning Parity with Noise …

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
SafetyDrift: Predicting When AI Agents Cross the Line Before They Actually Do

arXiv:2603.27148v1 Announce Type: new Abstract: When an LLM agent reads a confidential file, then writes a summary, then emails it externally, no single step is unsafe, but the sequence is a data leak…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Red-MIRROR: Agentic LLM-based Autonomous Penetration Testing with Reflective Verification and Knowledge-augmented Interaction

arXiv:2603.27127v1 Announce Type: new Abstract: Web applications remain the dominant attack surface in cybersecurity, where vulnerabilities such as SQL injection, XSS, and business logic flaws continu…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Gender-Based Heterogeneity in Youth Privacy-Protective Behavior for Smart Voice Assistants: Evidence from Multigroup PLS-SEM

arXiv:2603.27117v1 Announce Type: new Abstract: This paper investigates how gender shapes privacy decision-making in youth smart voice assistant (SVA) ecosystems. Using survey data from 469 Canadian y…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Sovereign Context Protocol: An Open Attribution Layer for Human-Generated Content in the Age of Large Language Models

arXiv:2603.27094v1 Announce Type: new Abstract: Large Language Models (LLMs) consume vast quantities of human-generated content for both training and real-time inference, yet the creators of that cont…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Detecting Protracted Vulnerabilities in Open Source Projects

arXiv:2603.27067v1 Announce Type: new Abstract: Timely resolution and disclosure of vulnerabilities are essential for maintaining the security of open-source software. However, many vulnerabilities re…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
HFIPay: Privacy-Preserving, Cross-Chain Cryptocurrency Payments to Human-Friendly Identifiers

arXiv:2603.26970v1 Announce Type: new Abstract: Sending cryptocurrency to an email address or phone number should be as simple as a bank transfer, yet naive schemes that map identifiers directly to bl…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
On the Optimal Number of Grids for Differentially Private Non-Interactive $K$-Means Clustering

arXiv:2603.26963v1 Announce Type: new Abstract: Differentially private $K$-means clustering enables releasing cluster centers derived from a dataset while protecting the privacy of the individuals. No…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Privacy-Preserving Iris Recognition: Performance Challenges and Outlook

arXiv:2603.26890v1 Announce Type: new Abstract: Iris-based biometric identification is increasingly recognized for its significant accuracy and long-term stability compared to other biometric modaliti…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
SPARK: Secure Predictive Autoscaling for Robust Kubernetes

arXiv:2603.26833v1 Announce Type: new Abstract: Achieving high availability and robust security in Kubernetes requires more than reactive scaling and standard perimeter firewalls. Traditional autoscal…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Efficient Encrypted Computation in Convolutional Spiking Neural Networks with TFHE

arXiv:2603.26781v1 Announce Type: new Abstract: With the rapid advancement of AI technology, we have seen more and more concerns on data privacy, leading to some cutting-edge research on machine learn…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
Constraint Migration: A Formal Theory of Throughput in AI Cybersecurity Pipelines

arXiv:2603.26733v1 Announce Type: new Abstract: We develop a formal theory of throughput in finite serial pipeline systems subject to stage multiplicative capacity perturbations, motivated by the depl…

arXiv Security Read →
◬ AI & Machine Learning Mar 31, 2026
CrowdStrike Gains 4% as Morgan Stanley Names It a Top AI Security Bet - 24/7 Wall St.

CrowdStrike Gains 4% as Morgan Stanley Names It a Top AI Security Bet 24/7 Wall St.

24/7 Wall St. Read →
◬ AI & Machine Learning Mar 30, 2026
datasette-files 0.1a3

Release: datasette-files 0.1a3 I'm working on integrating datasette-files into other plugins, such as datasette-extract . This necessitated a new release of the base plugin. owners_can_edit and owners…

Simon Willison Read →
◬ AI & Machine Learning Mar 30, 2026
Quoting Georgi Gerganov

Note that the main issues that people currently unknowingly face with local models mostly revolve around the harness and some intricacies around model chat templates and prompt construction. Sometimes…

Simon Willison Read →
◬ AI & Machine Learning Mar 30, 2026
(Some) Natural Emergent Misalignment from Reward Hacking in Non-Production RL

Authors: Satvik Golechha*, Sid Black*, Joseph Bloom * Equal Contribution. This work was done as part of the Model Transparency team at the UK AI Security Institute (AISI). Our code is available on Git…

AI Alignment Forum Read →
← Prev 78 / 118 Next →