<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
                    <title>Security News - Software vulnerabilities, data leaks, malware, viruses</title>
            <link>https://techxplore.com/rss-feed/security-news/</link>
            <language>en-us</language>
            <description>The latest news on cyber security, network security, software vulnerabilities, data leaks, malware, and viruses</description>

                            <item>
                    <title>New earphone design verifies users by their heartbeat, simplifying authentication</title>
                    <description>The use of biometric data in personal devices has been popular with consumers for tracking things like heart rate and sleep stages, but it is becoming increasingly common for identification purposes too. Identifying data can be used for device security authentication, secure access control and identity verification for financial transactions, which can make everyday activities like making purchases, using devices or entering your home more convenient, while providing enhanced security.</description>
                    <link>https://techxplore.com/news/2026-05-earphone-users-heartbeat-authentication.html</link>
                    <category>Hi Tech &amp; Innovation</category>                    <pubDate>Thu, 21 May 2026 13:50:01 EDT</pubDate>
                    <guid isPermaLink="false">news698589354</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/new-earphone-design-ca.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Watching the detectors: Researchers probe efficacy—and danger—of AI detection tools</title>
                    <description>Patrick Traynor, Ph.D., has questions. When the professor and interim chair of the University of Florida Department of Computer &amp; Information Science &amp; Engineering saw reports in the media positing that scientific literature is increasingly being generated by artificial intelligence, he wondered, &quot;How do they know?&quot;</description>
                    <link>https://techxplore.com/news/2026-05-detectors-probe-efficacy-danger-ai.html</link>
                    <category>Security</category>                    <pubDate>Wed, 20 May 2026 13:20:07 EDT</pubDate>
                    <guid isPermaLink="false">news698500982</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-writer.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI can seem more human than real humans in a classic Turing test</title>
                    <description>A new University of California San Diego study unveils the first empirical evidence that a modern artificial intelligence system can pass the Turing test—a major scientific benchmark that asks whether a machine can imitate human conversation so convincingly that people can&#039;t reliably tell it apart from a real person. In a series of experiments, people were often unable to tell the difference between humans and advanced large language models (LLMs).</description>
                    <link>https://techxplore.com/news/2026-05-ai-human-real-humans-classic.html</link>
                    <category>Security</category>                    <pubDate>Tue, 19 May 2026 17:40:06 EDT</pubDate>
                    <guid isPermaLink="false">news698430421</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2022/ai.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Should you accept internet cookies? Researchers say the open web could suffer without them</title>
                    <description>It&#039;s a choice you may face multiple times a day—and, at this point, your reaction is probably reflexive. Are you going to accept those internet cookies, reject them, or spend a little time customizing your settings?</description>
                    <link>https://techxplore.com/news/2026-05-internet-cookies-web.html</link>
                    <category>Internet</category>                    <pubDate>Mon, 18 May 2026 14:10:01 EDT</pubDate>
                    <guid isPermaLink="false">news698331560</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2025/cookie-internet.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Google disrupts hackers using AI to exploit an unknown weakness in a company&#039;s digital defense</title>
                    <description>Google said Monday that it had disrupted a criminal group&#039;s attempt to use artificial intelligence to exploit another company&#039;s previously unknown digital vulnerability, adding to heightened worries across government and private industry about AI&#039;s risks for cybersecurity.</description>
                    <link>https://techxplore.com/news/2026-05-google-disrupts-hackers-ai-exploit.html</link>
                    <category>Security</category>                    <pubDate>Mon, 11 May 2026 13:00:08 EDT</pubDate>
                    <guid isPermaLink="false">news697722295</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/google-disrupts-hacker.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Your conversations with AI may not be as private as you think</title>
                    <description>A study conducted by researchers at IMDEA Networks Institute has revealed that ChatGPT (OpenAI), Claude (Anthropic), Grok, and Perplexity AI use different types of trackers from Meta, Google, TikTok and other companies, potentially exposing data about users&#039; conversations and activity.</description>
                    <link>https://techxplore.com/news/2026-05-conversations-ai-private.html</link>
                    <category>Security</category>                    <pubDate>Thu, 07 May 2026 09:40:04 EDT</pubDate>
                    <guid isPermaLink="false">news697365181</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2023/chatgpt-10.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Can AI ascertain our personality traits from our ChatGPT history?</title>
                    <description>Large language models (LLMs), the computational models underpinning the functioning of ChatGPT, Gemini, and similar conversational platforms, are now used daily by many people worldwide. As these models can rapidly answer queries about most topics, many users use them to source information related to their personal and professional lives, sometimes sharing information about themselves.</description>
                    <link>https://techxplore.com/news/2026-05-ai-personality-traits-chatgpt-history.html</link>
                    <category>Consumer &amp; Gadgets</category>                    <pubDate>Tue, 05 May 2026 10:00:11 EDT</pubDate>
                    <guid isPermaLink="false">news697193407</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-profiling-risk.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>No digital content is safe from generative AI, researchers say</title>
                    <description>A research team led by Virginia Tech cybersecurity expert Bimal Viswanath has found a critical blind spot in today&#039;s image protection techniques designed to prevent bad actors from stealing online content for unauthorized artificial intelligence training, style mimicry, and deepfake manipulations. The study is published on the arXiv preprint server.</description>
                    <link>https://techxplore.com/news/2026-05-digital-content-safe-generative-ai.html</link>
                    <category>Security</category>                    <pubDate>Mon, 04 May 2026 15:40:03 EDT</pubDate>
                    <guid isPermaLink="false">news697125482</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/no-digital-content-is.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI fails to make inroads with cybercriminals, study finds</title>
                    <description>Cybercriminals have been struggling to adopt AI in their work, reports the first-of-its-kind study that analyzed a dataset of 100 million posts from underground cybercrime communities. The study is published on the arXiv preprint server.</description>
                    <link>https://techxplore.com/news/2026-05-ai-inroads-cybercriminals.html</link>
                    <category>Security</category>                    <pubDate>Mon, 04 May 2026 15:00:06 EDT</pubDate>
                    <guid isPermaLink="false">news697124462</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2020/cybercrime.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Evolving AI may arrive before AGI and create hard-to-control risks</title>
                    <description>Evolutionary biology holds clues for the future of AI, argue researchers from the HUN-REN Centre for Ecological Research, Eötvös Loránd University, and the Royal Flemish Academy of Belgium for Science and the Arts. In a new Perspective published April 20 in Proceedings of the National Academy of Sciences, the team warn that evolvable AI (eAI) systems that can undergo Darwinian evolution may soon emerge, and they will generate special risks that can be understood, and mitigated, based on insights from evolutionary biology.</description>
                    <link>https://techxplore.com/news/2026-04-evolving-ai-agi-hard.html</link>
                    <category>Security</category>                    <pubDate>Wed, 29 Apr 2026 17:20:09 EDT</pubDate>
                    <guid isPermaLink="false">news696701761</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/evolving-ai-may-arrive.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Needle-tip chip can secure pacemakers and insulin pumps against quantum attacks</title>
                    <description>As quantum computers advance, they are expected to be able to break tried-and-true security schemes that currently keep most sensitive data secure from attackers. Scientists and policymakers are working to design and implement post-quantum cryptography to defend against these future attacks.</description>
                    <link>https://techxplore.com/news/2026-04-needle-chip-pacemakers-insulin-quantum.html</link>
                    <category>Hi Tech &amp; Innovation</category>                    <pubDate>Thu, 23 Apr 2026 15:00:03 EDT</pubDate>
                    <guid isPermaLink="false">news696174481</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/new-chip-can-protect-w.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Generative AI may cut costs in machine-learning systems, but it increases risks of cyberattacks and data leaks</title>
                    <description>Using generative AI to design, train, or perform steps within a machine-learning system is risky, argues computer scientist Micheal Lones in a paper appearing in Patterns. Though large language models (LLMs) could expand the capabilities of machine-learning systems and decrease costs and labor needs, Lones warns that using them reduces transparency and control for the people developing and using these systems and increases the risk of malicious cyberattacks, data leaks, and bias against underrepresented groups.</description>
                    <link>https://techxplore.com/news/2026-04-generative-ai-machine-cyberattacks-leaks.html</link>
                    <category>Security</category>                    <pubDate>Wed, 22 Apr 2026 11:00:09 EDT</pubDate>
                    <guid isPermaLink="false">news695918949</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2024/generative-ai-2.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Making AI safer for victims of intimate partner violence</title>
                    <description>Conversational AI tools denied blunt requests for harmful content by researchers posing as intimate partner abusers, but these guardrails were easily circumvented when they requested the content under false pretenses, a new Cornell Tech study has found.</description>
                    <link>https://techxplore.com/news/2026-04-ai-safer-victims-intimate-partner.html</link>
                    <category>Security</category>                    <pubDate>Thu, 16 Apr 2026 12:40:09 EDT</pubDate>
                    <guid isPermaLink="false">news695560863</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-guardrail-bypass.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Memristor chip combines security and compute-in-memory for edge devices</title>
                    <description>A cross-institutional research team has developed Co-Located Authentication and Processing (CLAP), a privacy-preserving system that overcomes the trade-off between security and performance in edge computing devices. The study, titled &quot;Privacy-preserving data analysis using a memristor chip with co-located authentication and processing,&quot; is published in Science Advances. The team was led by Professor Ngai Wong and Dr. Zhengwu Liu from the Department of Electrical and Computer Engineering in the Faculty of Engineering at The University of Hong Kong (HKU), in collaboration with Tsinghua University and the Southern University of Science and Technology.</description>
                    <link>https://techxplore.com/news/2026-04-memristor-chip-combines-memory-edge.html</link>
                    <category>Hardware</category>                    <pubDate>Mon, 06 Apr 2026 12:20:04 EDT</pubDate>
                    <guid isPermaLink="false">news694695661</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/privacy-preserving-sys-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Vibrations in your skull may be your next password</title>
                    <description>A team led by Rutgers University researchers has developed a security system that could change how people log in to virtual and augmented reality platforms by eliminating passwords, personal identification numbers and eye scans and replacing them with something far more seamless.</description>
                    <link>https://techxplore.com/news/2026-03-vibrations-skull-password.html</link>
                    <category>Hi Tech &amp; Innovation</category>                    <pubDate>Tue, 31 Mar 2026 06:39:38 EDT</pubDate>
                    <guid isPermaLink="false">news694157757</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/vibrations-in-your-sku.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Hybrid AI tool unmasks hidden digital abuse to transform forensic investigations</title>
                    <description>Researchers from the University of Huddersfield have developed a hybrid AI tool to detect patterns of psychological abuse, including coercive control, in a bid to transform digital forensic investigations and mental health research.This innovation was developed as a primary outcome of Researcher Dhruv Patel&#039;s Ph.D. work under the mentorship of senior lecturer Dr. Anju Johnson and is designed to address a bottleneck in modern digital forensic investigations, integrating insights from a broader research team to ensure its real-world application.</description>
                    <link>https://techxplore.com/news/2026-03-hybrid-ai-tool-unmasks-hidden.html</link>
                    <category>Security</category>                    <pubDate>Wed, 25 Mar 2026 14:00:08 EDT</pubDate>
                    <guid isPermaLink="false">news693663961</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/hybrid-ai-tool-unmasks.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Thousands of websites are accidentally broadcasting sensitive data, study finds</title>
                    <description>Researchers have discovered a major security leak hiding in plain sight on the internet that could expose the personal data and financial records of millions of people. In a paper published on the arXiv preprint server, Nurullah Demir of Stanford University and colleagues analyzed 10 million websites to see how often API (application programming interfaces) credentials are exposed. These are digital keys or tokens that enable different software programs to communicate and are often used to process bank payments and access cloud storage.</description>
                    <link>https://techxplore.com/news/2026-03-thousands-websites-accidentally-sensitive.html</link>
                    <category>Internet</category>                    <pubDate>Wed, 25 Mar 2026 12:40:04 EDT</pubDate>
                    <guid isPermaLink="false">news693658041</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/thousands-of-websites.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Study finds AI privacy leaks hinge on a few high-impact neural network weights</title>
                    <description>Researchers have discovered that some of the elements of AI neural networks that contribute to data-privacy vulnerabilities are also key to the performance of those models. The researchers used this new information to develop a technique that better balances performance and privacy protection in these models.</description>
                    <link>https://techxplore.com/news/2026-03-ai-privacy-leaks-hinge-high.html</link>
                    <category>Security</category>                    <pubDate>Tue, 24 Mar 2026 12:00:01 EDT</pubDate>
                    <guid isPermaLink="false">news693570229</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/researchers-find-priva.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Sensor chips help identify deepfakes by adding cryptographic signatures to camera data</title>
                    <description>AI-generated images and videos pose a threat to democratic processes and undermine trust within society. Researchers at ETH Zurich have now developed chip technology that enables verification of the authenticity of sensor data including images or videos. Their study is published in the journal Nature Electronics.</description>
                    <link>https://techxplore.com/news/2026-03-sensor-chips-deepfakes-adding-cryptographic.html</link>
                    <category>Hardware</category>                    <pubDate>Tue, 24 Mar 2026 10:30:10 EDT</pubDate>
                    <guid isPermaLink="false">news693565096</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/chips-designed-to-help.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>&#039;Neuron-freezing&#039; technique can stop LLMs from giving users unsafe responses</title>
                    <description>Researchers have identified key components in large language models (LLMs) that play a critical role in ensuring these AI systems provide safe responses to user queries. The researchers used these insights to develop and demonstrate AI training techniques that improve LLM safety while minimizing the &quot;alignment tax,&quot; meaning the AI becomes safer without significantly affecting performance.</description>
                    <link>https://techxplore.com/news/2026-03-neuron-technique-llms-users-unsafe.html</link>
                    <category>Security</category>                    <pubDate>Mon, 23 Mar 2026 12:10:01 EDT</pubDate>
                    <guid isPermaLink="false">news693484740</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ask-ai.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI agents can autonomously coordinate propaganda campaigns without human direction</title>
                    <description>Imagine it is two weeks before a major election in a closely contested state. A controversial ballot measure is on the line. Suddenly, a wave of posts floods X, Reddit, and Facebook, all pushing the same narrative, all amplifying each other, all generating the appearance of a massive grassroots movement. Except none of it is real.</description>
                    <link>https://techxplore.com/news/2026-03-ai-agents-autonomously-propaganda-campaigns.html</link>
                    <category>Security</category>                    <pubDate>Thu, 12 Mar 2026 14:40:05 EDT</pubDate>
                    <guid isPermaLink="false">news692544181</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-agents-can-autonomo-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>&#039;Privacy by design&#039;: Tech protects against identity leaking during AI photo editing</title>
                    <description>Consumers, businesses, and institutions may soon have private, secure, and trustworthy generative AI tools for editing and sharing profile photos, ID images, and personal pictures without exposing their private identities to external platforms. Purdue University researchers Vaneet Aggarwal, Dipesh Tamboli, and Vineet Punyamoorty have developed the patent-pending system, which is utilized before and after photos are uploaded to an AI editing platform.</description>
                    <link>https://techxplore.com/news/2026-03-privacy-tech-identity-leaking-ai.html</link>
                    <category>Security</category>                    <pubDate>Thu, 12 Mar 2026 14:20:05 EDT</pubDate>
                    <guid isPermaLink="false">news692543641</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/privacy-by-design-tech.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI-powered defense system stops 5G cyber-attacks in a fraction of a second</title>
                    <description>An AI defense system has successfully detected and neutralized sophisticated 5G cyber-attacks in less than a tenth of a second, paving the way for more secure 5G and future 6G mobile networks, say researchers at the University of Surrey.</description>
                    <link>https://techxplore.com/news/2026-03-ai-powered-defense-5g-cyber.html</link>
                    <category>Security</category>                    <pubDate>Tue, 10 Mar 2026 11:20:07 EDT</pubDate>
                    <guid isPermaLink="false">news692359742</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/hacker.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>New &#039;negative light&#039; technology hides data transfers in plain sight</title>
                    <description>Engineers at UNSW Sydney and Monash have developed an innovative way of sending hidden information that&#039;s hard to intercept. Using a phenomenon known as &quot;negative luminescence,&quot; the system works by making signals blend perfectly into the background of natural heat radiation, such as can be seen with a thermal camera.</description>
                    <link>https://techxplore.com/news/2026-03-negative-technology-plain-sight.html</link>
                    <category>Telecom</category>                    <pubDate>Mon, 09 Mar 2026 11:00:03 EDT</pubDate>
                    <guid isPermaLink="false">news692270762</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/new-negative-light-tec.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI fake-news detectors may look accurate but fail in real use, study finds</title>
                    <description>A dubious link from a friend. A headline too sensational to be true. A video that seems fake but you can&#039;t be sure. As online misinformation grows harder to detect, new artificial-intelligence tools promise to help us separate fact from fiction. But do they actually work?</description>
                    <link>https://techxplore.com/news/2026-03-ai-fake-news-detectors-accurate.html</link>
                    <category>Security</category>                    <pubDate>Mon, 09 Mar 2026 08:20:01 EDT</pubDate>
                    <guid isPermaLink="false">news692262086</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/people-smartphones.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>How AI could end online anonymity</title>
                    <description>The internet is rife with anonymous accounts as users adopt pseudonyms, sometimes for genuine reasons like speaking freely, and other times for nefarious ones. But this era of online privacy could be coming to a close. In a study available on the arXiv preprint server, researchers demonstrate that large language models (LLMs) can identify the people behind these accounts at scale.</description>
                    <link>https://techxplore.com/news/2026-03-ai-online-anonymity.html</link>
                    <category>Security</category>                    <pubDate>Wed, 04 Mar 2026 12:40:04 EST</pubDate>
                    <guid isPermaLink="false">news691850205</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-could-end-online-an.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Deepfake songs are exploding, but a new tool shuts them down</title>
                    <description>Artificial intelligence models can now clone a voice with just a few seconds of audio, fueling a surge of deepfake songs online and creating a growing crisis for musicians who don&#039;t want their voices hijacked. Beyond the obvious intellectual property rights issue, this can lead to lost revenue and take an emotional toll on artists who put their heart and soul into their songs. But researchers now have a solution.</description>
                    <link>https://techxplore.com/news/2026-03-deepfake-songs-tool.html</link>
                    <category>Security</category>                    <pubDate>Tue, 03 Mar 2026 17:20:10 EST</pubDate>
                    <guid isPermaLink="false">news691780081</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/bad-bunny.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>AI often escalates to nuclear action in war games</title>
                    <description>There are some things perhaps we might not want artificial intelligence to handle, at least for the time being. When leading chatbots were put through war-game simulations, they opted for nuclear signaling or escalation in 95% of cases.</description>
                    <link>https://techxplore.com/news/2026-03-ai-escalates-nuclear-action-war.html</link>
                    <category>Security</category>                    <pubDate>Mon, 02 Mar 2026 13:20:03 EST</pubDate>
                    <guid isPermaLink="false">news691678634</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/ai-chat-2.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Your car&#039;s tire sensors could be used to track you</title>
                    <description>Researchers at IMDEA Networks Institute, together with European partners, have found that tire pressure sensors in modern cars can unintentionally expose drivers to tracking. Over a ten-week study, they collected signals from more than 20,000 vehicles, revealing a hidden privacy risk and highlighting the need for stronger security measures in future vehicle sensor systems.</description>
                    <link>https://techxplore.com/news/2026-02-car-sensors-track.html</link>
                    <category>Security</category>                    <pubDate>Wed, 25 Feb 2026 17:00:05 EST</pubDate>
                    <guid isPermaLink="false">news691252054</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/your-cars-tire-sensors-1.jpg" width="90" height="90" />
                                    </item>
                            <item>
                    <title>Jailbreaking the matrix: How researchers are bypassing AI guardrails to make them safer</title>
                    <description>A paper written by University of Florida Computer &amp; Information Science &amp; Engineering, or CISE, Professor Sumit Kumar Jha, Ph.D., contains so many science fiction terms, you&#039;d be forgiven for thinking it&#039;s a Hollywood script: Nullspace steering. Red teaming. Jailbreaking the matrix. But Jha&#039;s work is decidedly focused on real life, most notably strengthening the security measures built into AI tools to ensure they are safe for all to use.</description>
                    <link>https://techxplore.com/news/2026-02-jailbreaking-matrix-bypassing-ai-guardrails.html</link>
                    <category>Security</category>                    <pubDate>Sun, 22 Feb 2026 12:00:01 EST</pubDate>
                    <guid isPermaLink="false">news690803473</guid>
                                            <media:thumbnail url="https://scx1.b-cdn.net/csz/news/tmb/2026/security-ai.jpg" width="90" height="90" />
                                    </item>
                        </channel>
</rss>