Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • Copilot
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
  • Top stories
  • Sports
  • U.S.
  • Local
  • World
  • Science
  • Technology
  • Entertainment
  • Business
  • More
    Politics
Order byBest matchMost fresh
  • Any time
    • Past hour
    • Past 24 hours
    • Past 7 days
    • Past 30 days

AI, Google and Zero-Day Exploit

Digest more
Top News
Overview
Highlights
 · 1h
Google Says Hackers Used AI to Build Zero-Day Exploit
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.

Continue reading

 · 27d · on MSN
Adobe fixes PDF zero-day security bug that hackers have exploited for months
 · 17h · on MSN
Google says hackers used AI to develop a major security flaw
 · 1d
Google Disrupts Hackers Using AI to Exploit an Unknown Weakness in a Company's Digital Defense
Google said Monday that it had disrupted a criminal group’s attempt to use artificial intelligence to exploit another company’s previously unknown digital vulnerability, adding to heightened worries a...

Continue reading

 · 1d
Google Says Criminal Hackers Used A.I. to Find a Major Software Flaw
 · 22h
Google stopped a zero-day hack that it says was developed with AI
 · 21h
Google disrupts AI hackers exploiting unknown weakness in firm’s digital defence
“It’s here,” Mr Hultquist said. “The era of AI-driven vulnerability and exploitation is already here.”

Continue reading

 · 22h
Google says hacker used Mythos-like AI for software tool exploit
 · 17h
Google Makes Bombshell Claim That Hackers Used AI to Create Zero-Day Flaw in Their System
Bleeping Computer
1y

Hackers exploit 52 zero-days on the first day of Pwn2Own Ireland

On the first day of Pwn2Own Ireland, participants demonstrated 52 zero-day vulnerabilities across a range of devices, earning a total of $486,250 in cash prizes. Viettel Cyber Security took an early lead getting 13 points in their chase for the "Master of ...
1mon

Angry Hacker Drops Microsoft Zero-Day Exploit, 1 Billion Users Warned

A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.”
Ars Technica
1y

Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says

Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surveillance vendors (CSVs) represents a worldwide danger because they inevitably find their way into the hands of malicious parties, even when the CSVs ...
Bleeping Computer
1y

Hackers exploit ProjectSend flaw to backdoor exposed servers

Threat actors are using public exploits for a critical authentication bypass flaw in ProjectSend to upload webshells and gain remote access to servers. The flaw, tracked as CVE-2024-11680, is a critical authentication bug impacting ProjectSend versions ...
Hosted on MSN
26d

Microsoft's Security Response Center is being blamed for the zero-day BlueHammer exploit leak

On April 2, 2026, a security researcher using the name Chaotic Eclipse published a blog post stating that they were "doing it again." Under this warning, a link to a GitHub account page for a user named "Nightmare Eclipse" containing an exploit known as ...
New York Post
1mon

Google issues 2nd security warning in days over Chrome browser attacks

It’s a case of search-engine failure. Google has issued a security alert to Chrome users after confirming that cybercriminals had exploited a vulnerable system, marking the second such advisory in days. Dubbed CVE-2026-5281, this stealth bug is zero-day ...
VentureBeat
7mon

MCP stacks have a 92% exploit probability: How 10 plugins became enterprise security's biggest blind spot

The same connectivity that made Anthropic's Model Context Protocol (MCP) the fastest-adopted AI integration standard in 2025 has created enterprise cybersecurity's most dangerous blind spot. The design premise for MCP began with a commendable goal of ...
TechRepublic
2mon

Hackers Used New Exploit Kit to Compromise Thousands of iPhones

Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime. An iOS exploit framework has revealed how advanced mobile attack tools can move rapidly from ...
  • Privacy
  • Terms