AISecHub Profile Banner
AISecHub Profile
AISecHub

@AISecHub

Followers
3K
Following
741
Media
266
Statuses
575

🚀 AISecHub | AI & Cybersecurity | Discussing AI-driven threats, securing AI systems, and sharing insights on emerging challenges 💡

Singapore
Joined December 2024
Don't wanna be here? Send us removal request.
@AISecHub
AISecHub
23 days
AI Security Newsletter - June, 2025 A digest of AI security research, insights, reports, upcoming events, and tools & resources. #AIsecurity #AdversarialAI #RedTeamAI #LLMsecurity #AINewsletter.
1
0
13
@AISecHub
AISecHub
13 hours
Zero-Trust Agents: Adding Identity and Access to Multi-Agent Workflows - AI agents need identity and trust just like humans. In this article, we demonstrate a zero-trust approach to autonomous AI agents by integrating Identity and access management into.
0
2
6
@AISecHub
AISecHub
15 hours
DeepSeek a threat to national security, warns Czech cyber agency @AlexMartin: "Czechia’s cybersecurity agency issued a formal warning this week detailing national security risks posed by the use of software provided by Chinese artificial intelligence
Tweet media one
0
0
3
@AISecHub
AISecHub
1 day
Decompiling Smart Contracts with a Large Language Model - The widespread lack of broad source code verification on blockchain explorers such as Etherscan, where despite 78, 047, 845 smart contracts deployed on Ethereum (as of May 26, 2025), a mere 767,
Tweet media one
0
1
5
@AISecHub
AISecHub
1 day
Vulnerability Detection Model using LLM and Code Chunk - Software supply chain vulnerabilities arise when attackers exploit weaknesses by injecting vulnerable code into widely used packages or libraries within software repositories. While most existing
Tweet media one
0
1
5
@AISecHub
AISecHub
1 day
Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis - With the advance application of blockchain technology in various fields, ensuring the security and stability of smart contracts has emerged as a critical challenge.
Tweet media one
0
1
4
@AISecHub
AISecHub
1 day
Using LLMs for Security Advisory Investigations - Large Language Models are increasingly used in software security, but their trustworthiness in generating accurate vulnerability advisories remains uncertain. This study investigates the ability of ChatGPT
Tweet media one
0
0
6
@AISecHub
AISecHub
1 day
Detecting Hard-Coded Credentials in Software Repositories via LLMs - Software developers frequently hard-code credentials such as passwords, generic secrets, private keys, and generic tokens in software repositories, even though it is strictly advised
Tweet media one
0
0
6
@AISecHub
AISecHub
2 days
AI-driven NIDS. Large Language Models for Network Intrusion Detection Systems: Foundations, Implementations, and Future Directions - Large Language Models (LLMs) have revolutionized various fields with their exceptional capabilities in understanding,
Tweet media one
0
1
6
@AISecHub
AISecHub
2 days
The Dark Side of LLMs: Agent-based Attacks for Complete Computer Takeover - The rapid adoption of Large Language Model (LLM) agents and multi-agent systems enables unprecedented capabilities in natural language processing and generation. However, these
Tweet media one
0
0
4
@AISecHub
AISecHub
2 days
The Hidden Threat in Plain Text: Attacking RAG Data Loaders - Large Language Models (LLMs) have transformed human–machine interaction since ChatGPT’s 2022 debut, with Retrieval-Augmented Generation (RAG) emerging as a key framework that enhances LLM
Tweet media one
0
0
4
@AISecHub
AISecHub
2 days
Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations - Security alignment enables the Large Language Model (LLM) to gain the protection against malicious queries, but various jailbreak attack methods
Tweet media one
0
1
6
@AISecHub
AISecHub
2 days
Evaluating Language Models For Threat Detection in IoT Security Logs - Log analysis is a relevant research field in cybersecurity as they can provide a source of information for the detection of threats to networks and systems. This paper presents a
Tweet media one
0
0
4