Tag: zero-day
-
Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
Microsoft has marked May 2026 Patch Tuesday by releasing fixes for 120+ CVE-numbered vulnerabilities, none of which (for a change) are actively exploited or have been publicly … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/12/microsoft-may-2026-patch-tuesday/
-
Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days
Today is Microsoft’s May 2026 Patch Tuesday, with security updates for 120 flaws and no zero-days disclosed this month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-days/
-
AI-Built Zero-Day Nearly Powered Mass Attack
Google Says Criminals Used AI to Discover and Code Exploit. A cybercriminal group came close to launching a mass attack earlier this year, armed with a software exploit that an AI model had built from scratch, said Google researchers. Google said it worked with the affected vendor to patch the flaw before an attack could…
-
Pwn2Own Berlin 2026 Hits Capacity as Rejected Hackers Release 0-Days
Pwn2Own Berlin 2026 reportedly reached full capacity for the first time, prompting rejected researchers to publicly disclose zero-day exploits targeting Firefox, NVIDIA, and AI platforms. First seen on hackread.com Jump to article: hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/
-
Google Says Hackers Used AI to Build Zero-Day Exploit
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking. The post Google Says Hackers Used AI to Build Zero-Day Exploit appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-google-hackers-ai-zero-day-exploit/
-
Pwn2Own versus KI: Zero Day Initiative kann Flut an Anmeldungen nicht bewältigen
Der Hackerwettbewerb Pwn2Own in Berlin stößt an seine Kapazitätsgrenzen. Zahlreichen Teams wurde bereits abgesagt. Das dürfte vor allem an KI liegen. First seen on golem.de Jump to article: www.golem.de/news/pwn2own-versus-ki-zero-day-initiative-kann-flut-an-anmeldungen-nicht-bewaeltigen-2605-208572.html
-
OpenAI Daybreak Automates Vulnerability Detection and Patching
Tags: ai, control, cyber, cyberattack, detection, exploit, intelligence, openai, software, update, vulnerability, zero-dayThe relentless race against zero-day exploits and sophisticated cyberattacks requires a revolutionary approach to software security. Defenders are constantly overwhelmed by massive backlogs of alerts and the sheer volume of code requiring manual review. Enter OpenAI Daybreak, a frontier artificial intelligence system built specifically for cyber defenders. By shifting the focus from reactive damage control…
-
Google Warns Hackers Are Using AI to Build Working Zero-Day Exploits
Artificial intelligence has officially transitioned from an experimental hacking novelty into an industrial-scale weapon for cybercriminals. Google Threat Intelligence Group (GTIG) adversaries are now actively using generative AI models to discover vulnerabilities and engineer functional zero-day exploits. This marks a significant escalation in the cyber threat landscape, shifting AI’s role from a simple research assistant…
-
Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched
Tags: access, attack, business, control, cve, cybersecurity, exploit, flaw, group, incident response, infosec, linux, LLM, mitigation, risk, service, strategy, switch, technology, tool, update, vulnerability, zero-day), a logic bug which lets users easily obtain root access, and Dirty Frag, which abuses weaknesses in how the Linux kernel handles fragmented memory pages. The Dirty Frag attack combines two separate vulnerabilities affecting the Linux IPsec Encapsulating Security Payload (ESP) subsystem (CVE-2026-43284) and the RxRPC networking protocol (CVE-2026-43500). The proposal has set off a furious…
-
Google Says Hackers Used AI to Develop a Zero-Day Exploit
Google researchers say hackers used AI to develop zero-day exploits, Android backdoors, and automated supply chain attacks targeting GitHub and PyPI. First seen on hackread.com Jump to article: hackread.com/google-hackers-used-ai-develop-zero-day-exploit/
-
Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
Tags: 2fa, ai, cybercrime, exploit, google, hacker, intelligence, malicious, technology, threat, vulnerability, zero-dayGoogle on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely developed with an artificial intelligence (AI) system, marking the first time the technology has been put to use in the wild in a malicious context for vulnerability discovery and exploit generation.The activity is said to…
-
Google warns artificial intelligence is accelerating cyberattacks and zero-day exploits
Tags: access, ai, attack, cloud, cyber, cyberattack, defense, exploit, google, hacker, intelligence, supply-chain, threat, vulnerability, zero-dayGoogle says hackers now use AI to create exploits, automate attacks, evade defenses, and target AI supply chains at scale. Artificial intelligence is rapidly changing the cyber threat landscape, and a new report from the Google Cloud Threat Intelligence team highlights how attackers already use AI to improve vulnerability exploitation and gain initial access to…
-
AI used to develop working zero-day exploit, researchers warn
A report by GTIG shows threat groups are increasingly leveraging AI to scale attacks. The exploitation attempt was disclosed and patched, preventing a mass incident. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ai-working-zero-day-exploit-GTIG/819848/
-
Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program
Tags: ai, attack, ceo, cyber, cybersecurity, exploit, framework, github, Hardware, identity, infrastructure, Internet, penetration-testing, RedTeam, risk, threat, tool, vulnerability, zero-dayIdentity, who the AI agent is.Scope, what it is authorized to do.Attestation, whether it or its instructions have been tampered with.Delegation, who delegated authority.Revocation, whether that authority has been revoked.”Every AI agent on the internet today is a stranger. You don’t know who it is, what it’s authorized to do, or whether it’s been tampered…
-
Google spotted an AI-developed zero-day before attackers could use it
Researchers found artifacts in the code that proved AI was heavily involved. A prominent cybercrime group planned to exploit the zero-day en masse for financial gain. First seen on cyberscoop.com Jump to article: cyberscoop.com/google-threat-intelligence-group-ai-developed-zero-day-exploit/
-
<> von Google zeigt, wie Angreifer KI missbrauchen
Die Google Threat Intelligence Group (GTIG) hat ihren neuen Bericht ‘AI Threat Tracker” veröffentlicht. Dieser beschreibt detailliert die aktuellen Methoden von Angreifern und zeigt, dass diese nicht mehr nur mit künstlicher Intelligenz (KI) experimentieren, sondern die Technologie im großen Maßstab einsetzen. Die erste von einer KI entwickelte Zero-Day-Schwachstelle Google hat einen Zero-Day-Exploit (eine Umgehung […]…
-
Google researchers uncover criminal zero-day exploit likely built with AI
Google’s threat intelligence researchers have linked a zero-day exploit to AI-assisted development by a criminal group. The exploit targeted a popular open-source … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/11/google-ai-vulnerability-exploitation/
-
Hackers used AI to develop zero-day exploit for web admin tool
Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web administration tool was likely generated using AI. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool/
-
Hackers Observed Using AI to Develop Zero-Day for the First Time
Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AI-developed Zero-Day targeting open-source software First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/hackers-using-ai-zero-day-first/
-
Ivanti customers confront yet another actively exploited zero-day
Attackers are hitting a frequent target in the network edge space, intruding victim networks through a defect in a widely used mobile endpoint security product. First seen on cyberscoop.com Jump to article: cyberscoop.com/ivanti-epmm-zero-day-vulnerability-exploited/
-
Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks
Palo Alto says hackers exploited PAN-OS zero-day CVE-2026-0300 for weeks, gaining root access to exposed firewalls and hiding traces. Palo Alto Networks warned that suspected state-sponsored hackers have been exploiting the critical PAN-OS zero-day CVE-2026-0300 for nearly a month. After exploiting the flaw, attackers deployed tunneling tools such as EarthWorm and ReverseSocks5, used stolen credentials…
-
Palo Alto Networks warns state-linked cluster behind zero-day exploitation
A patch for the flaw, which hackers began targeting in early April, won’t be ready for another week. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/palo-alto-networks-state-linked-zero-day/819588/
-
Ivanti warns of new EPMM flaw exploited in zero-day attacks
Tags: attack, endpoint, exploit, flaw, ivanti, mobile, remote-code-execution, update, vulnerability, zero-dayIvanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/ivanti-warns-of-new-epmm-flaw-exploited-in-zero-day-attacks/
-
State-sponsored hackers likely behind zero-day attacks on Palo Alto firewalls
Palo Alto Networks believes the in-the-wild exploitation of a zero-day vulnerability (CVE-2026-0300) in its firewalls is likely the work of state-sponsored threat actors. A … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/07/state-sponsored-hackers-zero-day-attacks-palo-alto-firewalls/
-
ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories
Bad week.Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam ads, and stolen logins getting dumped into Discord channels like it’s normal. Some of these attack chains don’t even feel sophisticated anymore. More like some tired guy with a Telegram…
-
Palo Alto Networks firewall zero-day exploited for nearly a month
Palo Alto Networks warned customers that suspected state-sponsored hackers have been exploiting a critical-severity PAN-OS firewall zero-day vulnerability for nearly a month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/pan-os-firewall-rce-zero-day-exploited-in-attacks-since-april-9/
-
Palo Alto Networks: Hacker attackieren Firewalls über Zero-Day-Lücke
Angreifer kapern durch speziell gestaltete Datenpakete ganze Firewalls von Palo Alto Networks. Einen Patch dagegen gibt es frühestens ab dem 13. Mai. First seen on golem.de Jump to article: www.golem.de/news/palo-alto-networks-hacker-attackieren-firewalls-ueber-zero-day-luecke-2605-208405.html
-
A critical Palo Alto PAN-OS zero-day is being exploited in the wild
The vendor hasn’t released a patch for the vulnerability or described the scope and objective of confirmed attacks. First seen on cyberscoop.com Jump to article: cyberscoop.com/palo-alto-networks-pan-os-firewall-zero-day-vulnerability-exploited/
-
Palo Alto Networks Firewall Zero-Day Exploited in Active Attacks
Palo Alto Networks disclosed a critical PAN-OS firewall vulnerability that is being actively exploited. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/palo-alto-networks-firewall-zero-day-exploited-in-active-attacks/
-
Palo Alto Networks warns of firewall RCE zero-day exploited in attacks
Tags: attack, authentication, exploit, firewall, network, rce, remote-code-execution, vulnerability, zero-dayPalo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-actively-exploited-firewall-zero-day/

