arXiv:2512.15919v1 Announce Type: new
Abstract: Crime as a Service (CaaS) has evolved from isolated criminal incidents to a broad spectrum of illicit activities, including social media manipulation, foreign information manipulation and interference (FIMI), and the sale of disinformation toolkits. Tβ¦
The British government says it is investigating a βcyber incidentβ following news reports that hackers linked to China have gained access to thousands of confidential documents held by the Foreign, Commonwealth and Development Office
U.K.-based healthcare tech provider DXS International said it discovered and contained a data breach on Sunday. A ransomware gang took credit for the breach.
North Korea-linked hackers drove a record year for crypto thefts, favoring rare but massive attacks on centralized services, led by Bybitβs $1.4 billion breach.
arXiv:2512.14860v1 Announce Type: new
Abstract: Agentic AI introduces security vulnerabilities that traditional LLM safeguards fail to address. Although recent work by Unit 42 at Palo Alto Networks demonstrated that ChatGPT-4o successfully executes attacks as an agent that it refuses in chat mode, β¦
arXiv:2512.14778v1 Announce Type: new
Abstract: This study investigates the key skills and competencies needed by new cybersecurity graduates in the Philippines for entry-level positions. Using a descriptive cross-sectional research design, it combines analysis of job listings from Philippine onlinβ¦
arXiv:2511.17874v2 Announce Type: replace
Abstract: LLM applications (i.e., LLM apps) leverage the powerful capabilities of LLMs to provide users with customized services, revolutionizing traditional application development. While the increasing prevalence of LLM-powered applications provides usersβ¦