317

arXiv:2512.16717v1 Announce Type: new
Abstract: In actuality, phishing attacks remain one of the most prevalent cybersecurity risks in existence today, with malevolent actors constantly changing their strategies to successfully trick users. This paper presents an AI model for a phishing detection s…
211

arXiv:2512.15966v1 Announce Type: new
Abstract: For the rise of electric vehicles, especially for long-distance driving, minimizing charging times is vital. While multiple standards for DC fast charging exist, the leading standard in Europe is ISO 15118. In theory, this standard is accompanied by a…
212

Cybersecurity and password service providerΒ 1Password LLCΒ today announced a new partnership with artificial intelligence code editor company Cursor Inc. to bring secure, just-in-time secrets to Cursor. The partnership has started with the deployment of a Hooks Script that gives developers a secure, …
222

arXiv:2512.15919v1 Announce Type: new
Abstract: Crime as a Service (CaaS) has evolved from isolated criminal incidents to a broad spectrum of illicit activities, including social media manipulation, foreign information manipulation and interference (FIMI), and the sale of disinformation toolkits. T…
111

arXiv:2512.15794v1 Announce Type: new
Abstract: This paper analyzes the relationship between cybersecurity management, data protection, and corporate reputation in the context of digital transformation. The study examines how organizations implement strategies and tools to mitigate cyber risks, com…
109

arXiv:2411.14516v2 Announce Type: replace
Abstract: Neural networks are often trained on proprietary datasets, making them attractive attack targets. We present a novel dataset extraction method leveraging an innovative training time backdoor attack, allowing a malicious federated learning server t…