CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2889 articles  ·  updated every 4 hours · grows forever

2889Total
2846Full Text
May 20, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Mar 26, 2026
Infrastructure for Valuable, Tradable, and Verifiable Agent Memory

arXiv:2603.24564v1 Announce Type: new Abstract: Every API token you spend is your accumulated wealth; once you can prove its value and the effort behind it, you can resell it. As autonomous agents rep…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Analysing the Safety Pitfalls of Steering Vectors

arXiv:2603.24543v1 Announce Type: new Abstract: Activation steering has emerged as a powerful tool to shape LLM behavior without the need for weight updates. While its inherent brittleness and unrelia…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
IPsec based on Quantum Key Distribution: Adapting non-3GPP access to 5G Networks to the Quantum Era

arXiv:2603.24426v1 Announce Type: new Abstract: The advent of quantum computing will pose great challenges to the current communication systems, requiring essential changes in the establishment of sec…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
ClawKeeper: Comprehensive Safety Protection for OpenClaw Agents Through Skills, Plugins, and Watchers

arXiv:2603.24414v1 Announce Type: new Abstract: OpenClaw has rapidly established itself as a leading open-source autonomous agent runtime, offering powerful capabilities including tool integration, lo…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
A Large-Scale Study of Telegram Bots

arXiv:2603.24302v1 Announce Type: new Abstract: Telegram, initially a messaging app, has evolved into a platform where users can interact with various services through programmable applications, bots.…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search

arXiv:2603.24203v1 Announce Type: new Abstract: Recent advances in the Model Context Protocol (MCP) have enabled large language models (LLMs) to invoke external tools with unprecedented ease. This cre…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Towards Remote Attestation of Microarchitectural Attacks: The Case of Rowhammer

arXiv:2603.24172v1 Announce Type: new Abstract: Microarchitectural vulnerabilities increasingly undermine the assumption that hardware can be treated as a reliable root of trust. Prevention mechanisms…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Walma: Learning to See Memory Corruption in WebAssembly

arXiv:2603.24167v1 Announce Type: new Abstract: WebAssembly's (Wasm) monolithic linear memory model facilitates memory corruption attacks that can escalate to cross-site scripting in browsers or go un…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Toward a Multi-Layer ML-Based Security Framework for Industrial IoT

arXiv:2603.24111v1 Announce Type: new Abstract: The Industrial Internet of Things (IIoT) introduces significant security challenges as resource-constrained devices become increasingly integrated into …

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
PAC-DP: Personalized Adaptive Clipping for Differentially Private Federated Learning

arXiv:2603.24003v1 Announce Type: new Abstract: Differential privacy (DP) is crucial for safeguarding sensitive client information in federated learning (FL), yet traditional DP-FL methods rely predom…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Forensic Implications of Localized AI: Artifact Analysis of Ollama, LM Studio, and llama.cpp

arXiv:2603.23996v1 Announce Type: new Abstract: The proliferation of local Large Language Model (LLM) runners, such as Ollama, LM Studio and llama.cpp, presents a new challenge for digital forensics i…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Policy-Guided Threat Hunting: An LLM enabled Framework with Splunk SOC Triage

arXiv:2603.23966v1 Announce Type: new Abstract: With frequently evolving Advanced Persistent Threats (APTs) in cyberspace, traditional security solutions approaches have become inadequate for threat h…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
An Empirical Analysis of Google Play Data Safety Disclosures: A Consistency Study of Privacy Indicators in Mobile Gaming Apps

arXiv:2603.23935v1 Announce Type: new Abstract: The Google Play marketplace has introduced the Data Safety section to improve transparency regarding how mobile applications (apps) collect, share, and …

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
An Adaptive Neuro-Fuzzy Blockchain-AI Framework for Secure and Intelligent FinTech Transactions

arXiv:2603.23829v1 Announce Type: new Abstract: Financial systems have a growing reliance on computer-based and distributed systems, making FinTech systems vulnerable to advanced and quickly emerging …

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
How Vulnerable Are Edge LLMs?

arXiv:2603.23822v1 Announce Type: new Abstract: Large language models (LLMs) are increasingly deployed on edge devices under strict computation and quantization constraints, yet their security implica…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
AgentRFC: Security Design Principles and Conformance Testing for Agent Protocols

arXiv:2603.23801v1 Announce Type: new Abstract: AI agent protocols -- including MCP, A2A, ANP, and ACP -- enable autonomous agents to discover capabilities, delegate tasks, and compose services across…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
AetherWeave: Sybil-Resistant Robust Peer Discovery with Stake

arXiv:2603.23793v1 Announce Type: new Abstract: Peer-discovery protocols within P2P networks are often vulnerable: because creating network identities is essentially free, adversaries can eclipse hone…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
The Cognitive Firewall:Securing Browser Based AI Agents Against Indirect Prompt Injection Via Hybrid Edge Cloud Defense

arXiv:2603.23791v1 Announce Type: new Abstract: Deploying large language models (LLMs) as autonomous browser agents exposes a significant attack surface in the form of Indirect Prompt Injection (IPI).…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Leveraging Large Language Models for Trustworthiness Assessment of Web Applications

arXiv:2603.23781v1 Announce Type: new Abstract: The widespread adoption of web applications has made their security a critical concern and has increased the need for systematic ways to assess whether …

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Space Fabric: A Satellite-Enhanced Trusted Execution Architecture

arXiv:2603.23745v1 Announce Type: new Abstract: The emergence of decentralized satellite networks creates a pressing need for trust architectures that operate without physical access to hardware, with…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
n-VM: A Multi-VM Layer-1 Architecture with Shared Identity and Token State

arXiv:2603.23670v1 Announce Type: new Abstract: Multi-chain ecosystems suffer from fragmented identity, siloed liquidity, and bridge-dependent token transfers. We present n-VM, a Layer-1 architecture …

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
CAPTCHA Solving for Native GUI Agents: Automated Reasoning-Action Data Generation and Self-Corrective Training

arXiv:2603.23559v1 Announce Type: new Abstract: GUI agents are rapidly shifting from multi-module pipelines to end-to-end, native vision-language models (VLMs) that perceive raw screenshots and direct…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
The HyperFrog Cryptosystem: High-Genus Voxel Topology as a Trapdoor for Post-Quantum KEMs

arXiv:2603.23505v1 Announce Type: new Abstract: HyperFrog is an experimental post-quantum Key Encapsulation Mechanism that explores a variant of the Learning With Errors (LWE) design space in which th…

arXiv Security Read →
◬ AI & Machine Learning Mar 26, 2026
Cybersecurity's new race: Finding the CrowdStrike or Wiz of AI security - Axios

Cybersecurity's new race: Finding the CrowdStrike or Wiz of AI security Axios

Axios Read →
← Prev 88 / 121 Next →