As AI models continue to get more powerful, it’s not too surprising that some people are trying to use them for crime. The ...
Cybercriminals created a zero-day exploit with AI, the first example of artificial intelligence finding and hacking software ...
For the first time, Google has identified a zero-day exploit believed to have been developed using artificial intelligence.
Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web ...
The 2FA bypass exploit stemmed from a faulty trust assumption, providing evidence of AI reasoning that can discover ...
Cybercriminals used an AI model to find and weaponize a previously unknown software flaw, Google's threat team confirmed ...
Google researchers found evidence in the exploit’s code that it may have been created using AI, like a ‘hallucinated’ CVSS ...
Google identified the first malicious AI use for a zero-day 2FA bypass in an open-source admin tool, accelerating threat ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.” ...
A groundbreaking discovery by Google's Threat Intelligence Group reveals the first instance of a zero-day exploit created with the help of artificial intelligence.
On the second day of Pwn2Own Automotive 2026, security researchers collected $439,250 in cash awards after exploiting 29 unique zero-days. The Pwn2Own Automotive hacking contest focuses on automotive ...