Researchers uncover wormable XMRig campaign using BYOVD exploit and LLM-built React2Shell attacks hitting 90+ hosts.
The company open-sourced an 8 billion parameter LLM, Steerling-8B, trained with a new architecture designed to make its ...
Researchers from the University of Maryland, Lawrence Livermore, Columbia and TogetherAI have developed a training technique that triples LLM inference speed without auxiliary models or infrastructure ...
A Russian hacker was recently seen brute-forcing their way into hundreds of firewalls - but what makes this campaign really stand out is the fact that the seemingly low-skilled threat actor was able ...
AI safety tests found to rely on 'obvious' trigger words; with easy rephrasing, models labeled 'reasonably safe' suddenly fail, with attacks succeeding up to 98% of the time. New corporate research ...
A 24-year-old Indian-origin AI engineer has shared how joining a startup and moving to San Francisco fast-tracked his career ...
The Arkanix infostealer combines LLM-assisted development with a malware-as-a-service model, using dual language implementations to maximize reach and establish persistence.
Exposed endpoints quietly expand attack surfaces across LLM infrastructure. Learn why endpoint privilege management is important to AI security.
KittenTTS brings small text to speech models to edge devices; the Nano 8-bit model is about 25 MB, local playback is possible.
You can even self-host it!
Extension that converts individual Java files to Kotlin code aims to ease the transition to Kotlin for Java developers.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results