Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • Copilot
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
  • Top stories
  • Sports
  • U.S.
  • Local
  • World
  • Science
  • Technology
  • Entertainment
  • Business
  • More
    Politics
Order byBest matchMost fresh
  • Any time
    • Past hour
    • Past 24 hours
    • Past 7 days
    • Past 30 days

AI, Google and Zero-Day Exploit

Digest more
Top News
Overview
Highlights
 · 6h
Google Says Hackers Used AI to Build Zero-Day Exploit
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.

Continue reading

SecurityWeek · 1d
Google Detects First AI-Generated Zero-Day Exploit
 · 1d
Google disrupts hackers using AI to exploit an unknown weakness in a company’s digital defense
 · 1d
Google Disrupts Hackers Using AI to Exploit an Unknown Weakness in a Company's Digital Defense
Google said Monday that it had disrupted a criminal group’s attempt to use artificial intelligence to exploit another company’s previously unknown digital vulnerability, adding to heightened worries a...

Continue reading

 · 1d
Hackers Used AI to Build Zero-Day Attack, Google Researchers Say
eWeek · 8h
Google Reports First AI-Built Zero-Day Exploit as Cyber Model Fears Grow
 · 1d
Google says it likely thwarted effort by hacker group to use AI for 'mass exploitation event'
"The criminal threat actor planned to use it in a mass exploitation event but our proactive counter discovery may have prevented its use," Google wrote in the post, without disclosing the name of the ...

Continue reading

 · 1d
Google disrupts AI hackers exploiting unknown weakness in firm’s digital defence
 · 1d
Google says hacker used Mythos-like AI for software tool exploit
Bleeping Computer
1y

Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released

The Fortra FileCatalyst Workflow is vulnerable to an SQL injection vulnerability that could allow remote unauthenticated attackers to create rogue admin users and manipulate data on the application database. FileCatalyst Workflow is a web-based file ...
Android Authority
2y

This security exploit opens up the Chromecast with Google TV (HD) to custom ROMs

Security researchers have found a chain of exploits that allows the bootloader of the Chromecast with Google TV (HD) to be unlocked. Worryingly, this exploit chain allows the device to report a “secure” state to Android, meaning that potentially ...
1mon

Angry Hacker Drops Microsoft Zero-Day Exploit, 1 Billion Users Warned

A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.”
Bleeping Computer
2y

Exploit released for Palo Alto PAN-OS bug used in attacks, patch now

Update 4/16/24: Updated story with more information on how previous mitigations do not protect devices. Exploit code is now available for a maximum severity and actively exploited vulnerability in Palo Alto Networks' PAN-OS firewall software. Tracked as ...
The Hacker News
4d

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Dirty Frag exposes Linux systems to root escalation through chained kernel flaws, impacting Ubuntu, RHEL, Fedora, and others.
SiliconANGLE
2y

New research highlights difficulty of preventing Outlook security exploits

Haifei Li, a principal vulnerability researcher at Check Point Software Technologies Ltd., examines the universe of Microsoft Outlook exploits in a new blog post this week that has lessons for users and security managers alike. Li divides this collection ...
The Verge
2y

PSA: it’s time to update WinRAR due to a big security vulnerability

WinRAR doesn’t have an auto-update feature, but you’ll want to go ahead and patch it right now. WinRAR doesn’t have an auto-update feature, but you’ll want to go ahead and patch it right now. is a senior correspondent and author of Notepad, who has ...
  • Privacy
  • Terms