LLMs are powerful and fragile. OWASP’s updated Top 10 for Large Language Models compactly maps the...
LLMs are frozen in time, they know the world up to their training cutoff and nothing about your...
A research introduces LightCommands, a novel class of signal-injection attacks that convert...
AutoRobust uses RL to generate problem-space adversarial malware, real, functional binary/runtime...
Researchers demonstrated a class of AI-embedded targeted malware: the attack packs the targeting...
Researchers demonstrate malware modulating Ethernet PHY/cable activity to emit RF signals that a...
Researchers introduce SUAD, a novel inaudible attack that uses piezo transmitters on solid surfaces...
Researchers uncovered a seven-year campaign that weaponized hundreds of seemingly benign Chrome/Edge...
You’re using encrypted apps. You’ve got a VPN running. You did “everything right.” And yet… your...
Research builds a focused benchmark and attack suite showing that resumes, the very documents we feed...
A empirical study analyzing ~45,000 model repos across five major model-sharing platforms finds that...
Research and coordinated disclosures show a UEFI implementation bug in some motherboards that can...
Researchers tested 50 emoji-augmented prompts across four open-source LLMs (Mistral 7B, Qwen 2 7B,...
Long-term memory in agentic AI is increasingly a material security and governance concern. Security...
Reporting from Unit 42 highlights a growing tactic in state-linked intrusion campaigns: the use of...
A disclosed zero‑day vulnerability affecting Samsung mobile devices has been added to the U.S....
ASI-ARCH, an autonomous multi-agent system that conducts end-to-end neural-architecture research: it...
research demonstrates a practical side-channel attack that uses high-performance optical mouse...
Security teams are reporting an increase in phishing campaigns that mimic legitimate CAPTCHA...
Varonis Threat Labs reports a new Copilot vulnerability called “Reprompt” that can enable silent data...
Anthropic’s “Claudius” — an experiment that gives its Claude model autonomy, tools and Slack access...
Retail pricing has a long history: posting one fixed price transformed shopping into a more...
Technology Review reports that a patient with a Neuralink implant has been using generative-AI tools...
Some public toilet facilities in China are using dispensers that require users to scan a QR code and...
Dr. Annie Kathuria outlines a research roadmap for developing transplantable brain tissue grown from...
Researchers at KU Leuven have disclosed WhisperPair, a set of attacks targeting the Google Fast Pair...
The U.S. Department of Defense has awarded multi-million-dollar contracts to a small private firm...
A research paper presents Wi‑Mesh, a system that uses Wi‑Fi signal reflections to construct detailed...
Leaked internal materials and independent analysis indicate that the commercial spyware vendor...
Security researchers have documented a wave of advanced phishing kits named BlackForce, GhostFrame,...