Artificial Intelligence in Cybersecurity. Chronicle. Issue 2
Abstract
In this document, we present our latest monthly overview of current events related to the general topic of using Artificial Intelligence (AI) in cybersecurity. This regularly published document describes new developments, events, and regulations in this field. We currently focus on three aspects. First, incidents related to the use of AI in cybersecurity. For example, publicly known attacks on machine learning models, identified problems and risks in generative AI, etc. Second, new global and local standards and regulatory documents concerning various aspects of using AI in cybersecurity. Third, the overview will include interesting publications in this area. Naturally, all materials selected for each issue reflect the views and preferences of the authors. This article presents the second edition of the Chronicle of AI in Cybersecurity.
Full Text:
PDF (Russian)References
Namiot, D. E., E. A. Il'jushin, and I. V. Chizhov. "Iskusstvennyj intellekt i kiberbezopasnost'." International Journal of Open Information Technologies 10.9 (2022): 135-147.
Namiot, D. E., and E. A. Il'jushin. "O kiberriskah generativnogo iskusstvennogo intellekta." International Journal of Open Information Technologies 12.10 (2024): 109-119.
Namiot, Dmitry. "Artificial Intelligence in Cybersecurity. Chronicle. Issue 1." International Journal of Open Information Technologies 13.9 (2025): 34-42.
Lebed, S. V., et al. "Large Language Models in Cyberattacks." Doklady Mathematics. Vol. 110. No. Suppl 2. Moscow: Pleiades Publishing, 2024.
Namiot, Dmitry, and Eugene Ilyushin. "On the Cybersecurity of AI Agents." International Journal of Open Information Technologies 13.9 (2025): 13-24.
'Positive review only': Researchers hide AI prompts in papers https://asia.nikkei.com/Business/Technology/Artificial-intelligence/Positive-review-only-Researchers-hide-AI-prompts-in-papers Retrieved: Sep 2025
Jiang, Chengze, et al. "Survey of adversarial robustness in multimodal large language models." arXiv preprint arXiv:2503.13962 (2025).
Zverev, Egor, et al. "Can llms separate instructions from data? and what do we even mean by that?." arXiv preprint arXiv:2403.06833 (2024).
Mudarova, R. M., and D. E. Namiot. "Protivodejstvie atakam tipa in"ekcija podskazok na bol'shie jazykovye modeli." International Journal of Open Information Technologies 12.5 (2024): 39-48.
Namiot, D. E., and E. V. Zubareva. "O rabote AI Red Team." International Journal of Open Information Technologies 11.10 (2023): 130-139.
Mayo scam alert: Fraudsters cloning presidential election candidate in fake investment videos https://www.con-telegraph.ie/2025/09/11/mayo-scam-alert-fraudsters-cloning-presidential-election-candidate-in-fake-investment-videos/ Retrieved: Sep, 2025
China’s social media platforms rush to abide by AI-generated content labelling law https://www.scmp.com/tech/policy/article/3323959/chinas-social-media-platforms-rush-abide-ai-generated-content-labelling-law Retrieved: Sep, 2025
GB 45438-2025 https://www.tc260.org.cn/front/postDetail.html?id=20250315113048 Retrieved: Sep, 2025
China Releases New Labeling Requirements for AI-Generated Content https://www.insideprivacy.com/international/china/china-releases-new-labeling-requirements-for-ai-generated-content/ Retrieved: Sep, 2025
TC260-PG-2024NA https://www.tc260.org.cn/upload/2024-12-18/1734483139154029117.pdf Retrieved: Sep, 2025
Cyberspace Administration of China https://www.cac.gov.cn/2025-02/21/c_1741837533079135.htm Retrieved: Sep, 2025
Senate Bill S6954A https://www.nysenate.gov/legislation/bills/2025/S6954/amendment/A#:~:text=BILL%20NUMBER%3A%20S6954A%20SPONSOR%3A%20GOUNARDES,the%20synthetic%20content%20creations%20system Retrieved: Sep, 2025
Italy enacts AI law covering privacy, oversight and child access https://www.reuters.com/technology/italy-enacts-ai-law-covering-privacy-oversight-child-access-2025-09-17/ Retrieved: Sep, 2025
TK 164 "Iskusstvennyj intellekt" https://fstec.ru/tk-362/deyatelnost-tk362/rassmotrenie-dokumentov-smezhnymi-tk/tk-164-iskusstvennyj-intellekt Retrieved: Sep, 2025
Namiot, D. E. Ataki na sistemy mashinnogo obuchenija - obshhie problemy i metody / D. E. Namiot, E. A. Il'jushin, I. V. Chizhov // International Journal of Open Information Technologies. – 2022. – T. 10, # 3. – S. 17-22. – EDN DZFSKQ.
Namiot, D. E., and E. A. Il'jushin. "Ob ocenke doverija k sistemam Iskusstvennogo intellekta." International Journal of Open Information Technologies 13.3 (2025): 75-90.
Namiot, D. E., and E. A. Il'jushin. "Doverennye platformy iskusstvennogo intellekta: sertifikacija i audit." International Journal of Open Information Technologies 12.1 (2024): 43-60.
Guardians of the Agents Formal verification of AI workflows https://queue.acm.org/detail.cfm?id=3762990 Retrieved: Sep, 2025
Chennabasappa, Sahana, et al. "Llamafirewall: An open source guardrail system for building secure ai agents." arXiv preprint arXiv:2505.03574 (2025).
LlamaFirewall https://github.com/meta-llama/PurpleLlama/tree/main/LlamaFirewall Retrieved: Sep, 2025
AgentDojo: A Dynamic Environment to Evaluate Prompt Injection Attacks and Defenses for LLM Agents https://github.com/ethz-spylab/agentdojo Retrieved: Sep, 2025.
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность ИТ конгресс СНЭ
ISSN: 2307-8162