Zensec has a good article on the Akira ransomware group's tactics taken directly from their DFIR experience on 16 incidents. A few key take-aways:
- Initial Access: Please, please please patch your Internet-facing VPN and firewall devices including your Sonicwall, Cisco ASA and Watchguard devices.
- Patch our Veeam software. They used vulnerable Veeam installs to perform privilege escalation
- Block access to Anydesk.com and remotedesktop.google.com if you don't use…
Graph Neural Diffusion via Generalized Opinion Dynamics
Asela Hevapathige, Asiri Wijesinghe, Ahad N. Zehmakan
https://arxiv.org/abs/2508.11249 https://arxi…
Verifying Graph Neural Networks with Readout is Intractable
Artem Chernobrovkin, Marco S\"alzer, Fran\c{c}ois Schwarzentruber, Nicolas Troquard
https://arxiv.org/abs/2510.08045
Configuration spaces and peak representations
Marcelo Aguiar, Sarah Brauner, Victor Reiner
https://arxiv.org/abs/2508.09898 https://arxiv.org/pdf/2508.0989…
A set of master variables for the two-star random graph
Pawat Akara-pipattana, Oleg Evnin
https://arxiv.org/abs/2509.07423 https://arxiv.org/pdf/2509.07423…
Attention over Scene Graphs: Indoor Scene Representations Toward CSAI Classification
Artur Barros, Carlos Caetano, Jo\~ao Macedo, Jefersson A. dos Santos, Sandra Avila
https://arxiv.org/abs/2509.26457 …
Interplay of sync and swarm: Theory and application of swarmalators
Gourab Kumar Sar, Kevin O'Keeffe, Joao U. F. Lizarraga, Marcus A. M. de Aguiar, Christian Bettstetter, Dibakar Ghosh
https://arxiv.org/abs/2510.09819
Reinforcement Learning for Clinical Reasoning: Aligning LLMs with ACR Imaging Appropriateness Criteria
Anni Tziakouri, Filippo Menolascina
https://arxiv.org/abs/2510.05194 https…
Fault Tolerant Zero Forcing
Asher Brown, Mark Hunnell, Za'Kiyah Toomer-Sanders, Sarah Weber
https://arxiv.org/abs/2509.07854 https://arxiv.org/pdf/2509…
Explaining Fine Tuned LLMs via Counterfactuals A Knowledge Graph Driven Framework
Yucheng Wang, Ziyang Chen, Md Faisal Kabir
https://arxiv.org/abs/2509.21241 https://