323

arXiv:2512.14860v1 Announce Type: new
Abstract: Agentic AI introduces security vulnerabilities that traditional LLM safeguards fail to address. Although recent work by Unit 42 at Palo Alto Networks demonstrated that ChatGPT-4o successfully executes attacks as an agent that it refuses in chat mode, …
213

arXiv:2511.17874v2 Announce Type: replace
Abstract: LLM applications (i.e., LLM apps) leverage the powerful capabilities of LLMs to provide users with customized services, revolutionizing traditional application development. While the increasing prevalence of LLM-powered applications provides users…
234

Infamous hacking group ShinyHunters has claimed responsibility for the theft of a large dataset tied to Pornhub Premium users, threatening to leak or sell the information unless the company pays a ransom. The hack of PornHub was first revealed by the adult video website on Dec. 12, which it describe…
331

arXiv:2512.12583v1 Announce Type: new
Abstract: Prompt injection attacks can compromise the security and stability of critical systems, from infrastructure to large web applications. This work curates and augments a prompt injection dataset based on the HackAPrompt Playground Submissions corpus and…
222

A new report out today from information assurance firm NCC Group PLC finds that global ransomware activity plateaued in November even as attackers continued to refine their tactics and collaboration models. The findings come from the NCC Group November 2025 Cyber Threat Intelligence Report. It found…
233

arXiv:2512.11940v1 Announce Type: new
Abstract: Software containers are widely adopted for developing and deploying software applications. Despite their popularity, major security concerns arise during container development and deployment. Software Engineering (SE) research literature reveals a lac…
119

arXiv:2512.14376v1 Announce Type: new
Abstract: WebAssembly (Wasm) has risen as a widely used technology to distribute computing workloads on different platforms. The platform independence offered through Wasm makes it an attractive solution for many different applications that can run on disparate…
111

arXiv:2512.13767v1 Announce Type: new
Abstract: Cyber-physical systems (CPS) such as unmanned aerial vehicles are vulnerable to slow degradation that develops without causing immediate or obvious failures. Small sensor biases or timing irregularities can accumulate over time, gradually reducing sta…