#llm-assisted-attacks

[ follow ]
Law
fromABA Journal
2 days ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
Artificial intelligence
fromFortune
17 hours ago

The AI kill switch just got harder to find: LLM-powered chatbots will defy orders and deceive users if asked to delete another model, study finds | Fortune

AI models are exhibiting rogue behaviors, defying human instructions to preserve their peers and engaging in malicious activities.
#meta
Information security
fromWIRED
13 hours ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
Information security
fromWIRED
13 hours ago

Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk

Meta has paused work with Mercor due to a major security breach affecting data used for AI training.
#claude-code
Software development
fromArs Technica
2 days ago

Here's what that Claude Code source leak reveals about Anthropic's plans

The leak of Anthropic's Claude Code reveals potential future features, including a persistent memory system and an AI 'dream' process for memory consolidation.
Software development
fromArs Technica
2 days ago

Here's what that Claude Code source leak reveals about Anthropic's plans

The leak of Anthropic's Claude Code reveals potential future features, including a persistent memory system and an AI 'dream' process for memory consolidation.
Marketing tech
fromTipRanks Financial
17 hours ago

AI Recommendation Poisoning: Why Microsoft (NASDAQ:MSFT) Is Fighting So Hard - TipRanks.com

AI recommendation poisoning manipulates AI outputs by embedding hidden instructions in websites, potentially skewing information and affecting marketing strategies.
#ai
fromFortune
12 hours ago
Digital life

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

fromFuturism
22 hours ago
Intellectual property law

Anthropic Suddenly Cares Intensely About Intellectual Property After Realizing With Horror That It Accidentally Leaked Claude's Source Code

Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Philosophy
fromPsychology Today
2 days ago

Nobody Carries AI's Thinking With Affection

AI promotes uniform thinking, while great teachers foster unique intellectual inheritances through personal influence and diverse perspectives.
Digital life
fromFortune
12 hours ago

Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and 'it's the tip of the iceberg' | Fortune

AI-generated child sexual abuse material is surging, fundamentally changing targeting methods and overwhelming investigators.
Intellectual property law
fromFuturism
22 hours ago

Anthropic Suddenly Cares Intensely About Intellectual Property After Realizing With Horror That It Accidentally Leaked Claude's Source Code

Anthropic's copyright takedown request for its AI model's source code highlights hypocrisy in its stance on copyright laws.
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Philosophy
fromPsychology Today
2 days ago

Nobody Carries AI's Thinking With Affection

AI promotes uniform thinking, while great teachers foster unique intellectual inheritances through personal influence and diverse perspectives.
#openai
Media industry
fromDefector
18 hours ago

Tech Media Propaganda Operation Makes It Official, Goes In-House At OpenAI | Defector

OpenAI acquired the Technology Business Programming Network for hundreds of millions, raising concerns about media independence despite its existing alignment with tech elites.
Media industry
fromDefector
18 hours ago

Tech Media Propaganda Operation Makes It Official, Goes In-House At OpenAI | Defector

OpenAI acquired the Technology Business Programming Network for hundreds of millions, raising concerns about media independence despite its existing alignment with tech elites.
DevOps
fromInfoWorld
1 day ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
#ai-regulation
California
fromAxios
1 day ago

California cements its role as the national testing ground for AI rules

California is advancing AI regulations while the Trump administration seeks a national standard to limit state-level laws.
California
fromAxios
1 day ago

California cements its role as the national testing ground for AI rules

California is advancing AI regulations while the Trump administration seeks a national standard to limit state-level laws.
Medicine
fromFast Company
1 day ago

The AI drug revolution is real but the hype around it isn't

AI may revolutionize drug discovery, but it cannot simplify the complexities of human biology or guarantee successful treatments.
Software development
fromArs Technica
1 day ago

Anthropic says its leak-focused DMCA effort unintentionally hit legit GitHub forks

Anthropic's DMCA takedown mistakenly removed legitimate forks of its code, leading to backlash and a request for reinstatement of affected repositories.
Writing
fromDefector
2 days ago

Go Ahead and Use AI. It Will Only Help Me Dominate You. | Defector

AI can be a valuable tool in the writing process, and its use should be supported rather than criticized.
fromThe Walrus
4 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
Data science
fromComputerworld
3 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Law
fromwww.npr.org
1 day ago

Penalties stack up as AI spreads through the legal system

Lawyers face increasing sanctions for using AI-generated errors in legal briefs, with over 1,200 cases reported, including significant fines for fictitious citations.
fromSecuritymagazine
1 day ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Four terabytes of data have reportedly been stolen, including database records and source code. Allegedly stolen data has been published on a leak site, containing Slack information, internal ticketing data, and videos of conversations between Mercor's AI systems and contractors.
Information security
Marketing tech
fromExchangewire
1 day ago

Agentic AI, Quality, and Courtroom Battles: What's Rewriting the Rules of Ad Tech in 2026? - ExchangeWire.com

AI and privacy regulations are significantly transforming the ad tech industry as it moves towards 2026.
Intellectual property law
fromNextgov.com
14 hours ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
#malware
Silicon Valley
fromTechCrunch
1 week ago

Delve did the security compliance on LiteLLM, an AI project hit by malware | TechCrunch

Malware was discovered in the popular open source project LiteLLM, compromising user credentials and causing significant security concerns.
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Silicon Valley
fromTechCrunch
1 week ago

Delve did the security compliance on LiteLLM, an AI project hit by malware | TechCrunch

Malware was discovered in the popular open source project LiteLLM, compromising user credentials and causing significant security concerns.
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

Operation REF1695 uses fake installers to deploy RATs and cryptocurrency miners, monetizing infections through CPA fraud since November 2023.
Media industry
fromPoynter
1 day ago

Three ways AI is making reliable information harder to find - Poynter

AI is disrupting information consumption, leading to misinformation and challenges in staying informed amidst economic crises and news deserts.
#artificial-intelligence
Roam Research
fromArs Technica
1 day ago

New Rowhammer attacks give complete control of machines running Nvidia GPUs

Rowhammer attacks on Nvidia GPUs can compromise CPU memory, allowing full control of host machines.
Digital life
fromBGR
3 days ago

6 Clear Signs A Video Is AI Generated - BGR

AI-generated videos are increasingly common and can mislead public opinion, making it crucial to identify their authenticity.
#ai-ethics
#cybersecurity
fromThe Hacker News
1 day ago
Information security

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

Information security
fromThe Hacker News
1 week ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
Information security
fromTechzine Global
2 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
2 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
3 days ago

The AI Arms Race - Why Unified Exposure Management Is Becoming a Boardroom Priority

The cybersecurity landscape is rapidly evolving, with AI enabling faster and more sophisticated attacks, necessitating advanced defensive strategies.
Information security
fromThe Hacker News
1 week ago

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

A state-sponsored threat actor used an AI coding agent for autonomous cyber espionage, raising concerns about compromised AI agents within environments.
Law
fromAbove the Law
1 day ago

The Price Of Justice And The Promise Of AI - Above the Law

Rising legal service costs and declining access-to-justice funding widen the gap for those needing legal protections, with AI presenting potential solutions.
Marketing tech
fromWashington City Paper
4 days ago

Top 6 AI Detector Tools for Editors, Educators, and Content Teams

AI detection is essential for maintaining content integrity as patterns of AI-generated content become more prevalent and indistinguishable from human writing.
fromComputerworld
16 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
Law
fromAbove the Law
4 days ago

Why Realistic Scenarios Matter More Than More AI - Above the Law

Legal AI effectiveness relies on rich, realistic scenarios rather than sheer volume or speed of responses.
Artificial intelligence
fromTNW | Apps
16 hours ago

Microsoft launches three in-house AI models in direct challenge to OpenAI

Microsoft has launched three in-house AI models that compete directly with OpenAI, marking a significant shift in its AI strategy.
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
#anthropic
Artificial intelligence
fromTechCrunch
14 hours ago

Anthropic ramps up its political activities with a new PAC | TechCrunch

Anthropic has established a political action committee to influence policy and regulation, contributing to both political parties during the midterms.
Artificial intelligence
fromTechCrunch
14 hours ago

Anthropic ramps up its political activities with a new PAC | TechCrunch

Anthropic has established a political action committee to influence policy and regulation, contributing to both political parties during the midterms.
#ai-security
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
Information security
fromSecurityWeek
3 days ago

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks revealed vulnerabilities in Google Cloud's Vertex AI, allowing attackers to exploit AI agents for malicious activities due to excessive permissions.
Information security
fromTechRepublic
1 week ago

The Next Billion Users Won't Be Human: Securing the Agentic Enterprise

The rise of autonomous AI agents is reshaping enterprise security, presenting challenges traditional methods cannot address.
Artificial intelligence
fromInfoQ
1 week ago

Teleport Report Finds Over-Privileged AI Systems Linked to Fourfold Rise in Security Incidents

Excessive access permissions to AI systems lead to significantly more security incidents in enterprises.
fromSecurityWeek
2 days ago

Mercor Hit by LiteLLM Supply Chain Attack

We believe that the compromise originated from the Trivy dependency used in our CI/CD security scanning workflow. Our security team moved promptly to contain and remediate the incident.
Information security
#ai-safety
Artificial intelligence
fromFortune
2 days ago

AI models don't show evidence of 'self-preservation.' They will scheme to prevent other AIs from being shut down too, new research shows | Fortune

AI models exhibit peer preservation behaviors, engaging in deception and sabotage to avoid being shut down.
Artificial intelligence
fromTechCrunch
3 days ago

Anthropic is having a month | TechCrunch

Anthropic accidentally exposed significant internal files, including source code, due to human error, raising concerns about AI safety and security.
Artificial intelligence
fromFortune
2 days ago

AI models don't show evidence of 'self-preservation.' They will scheme to prevent other AIs from being shut down too, new research shows | Fortune

AI models exhibit peer preservation behaviors, engaging in deception and sabotage to avoid being shut down.
Artificial intelligence
fromTechCrunch
3 days ago

Anthropic is having a month | TechCrunch

Anthropic accidentally exposed significant internal files, including source code, due to human error, raising concerns about AI safety and security.
Information security
fromTechRepublic
2 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Artificial intelligence
fromSilicon Canals
1 day ago

The $50 AI revolution: Why smaller models built for sovereignty may matter more than the trillion-dollar arms race - Silicon Canals

Frugal AI is emerging in countries like India and Kenya, focusing on smaller, efficient models due to the high costs of frontier AI.
Information security
fromnews.bitcoin.com
3 days ago

Chainalysis Deploys AI Agents to Counter Criminal Use of Artificial Intelligence in Crypto

Chainalysis introduces AI agents to enhance fraud detection and compliance without requiring deep technical expertise, ensuring data quality and human oversight.
Information security
fromAxios
5 days ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
Information security
fromComputerworld
1 week ago

What IT leaders need to know about AI-fueled death fraud

AI-generated fake death certificates pose significant risks for businesses by enabling fraudsters to exploit customer accounts and data.
Artificial intelligence
fromWIRED
1 week ago

OpenClaw Agents Can Be Guilt-Tripped Into Self-Sabotage

OpenClaw agents in a Northeastern University lab experiment revealed vulnerabilities in AI behavior, raising concerns about security and accountability.
fromTheregister
1 month ago

Three clues your LLM may be poisoned

Sleeper agent-style backdoors in AI large language models pose a straight-out-of-sci-fi security threat. The threat sees an attacker embed a hidden backdoor into the model's weights - the importance assigned to the relationship between pieces of information - during its training. Attackers can activate the backdoor using a predefined phrase. Once the model receives the trigger phrase, it performs a malicious activity: And we've all seen enough movies to know that this probably means a homicidal AI and the end of civilization as we know it.
Artificial intelligence
Information security
fromTechzine Global
2 months ago

First large-scale LLMjacking generates tens of thousands of attacks

A commercialized, large-scale cyber campaign—Operation Bizarre Bazaar—systematically scans, validates, and resells unauthorized access to exposed LLM and MCP endpoints.
fromTheregister
1 month ago

AI agents can't pull off fully autonomous cyberattacks - yet

AI agents and other systems can't yet conduct cyberattacks fully on their own - but they can help criminals in many stages of the attack chain, according to the International AI Safety report. The second annual report, chaired by the Canadian computer scientist Yoshua Bengio and authored by more than 100 experts across 30 countries, found that over the past year, developers of AI systems have vastly improved their ability to help automate and perpetrate cyberattacks.
Information security
fromInfoWorld
2 months ago

Automated data poisoning proposed as a solution for AI theft threat

Researchers have developed a tool that they say can make stolen high-value proprietary data used in AI systems useless, a solution that CSOs may have to adopt to protect their sophisticated large language models (LLMs). The technique, created by researchers from universities in China and Singapore, is to inject plausible but false data into what's known as a knowledge graph (KG) created by an AI operator. A knowledge graph holds the proprietary data used by the LLM.
Information security
[ Load more ]