Google researchers found evidence in the exploit’s code that it may have been created using AI, like a “hallucinated” CVSS ...
The company said that it had identified, for the first time, hackers using artificial intelligence to discover an unknown bug ...
Cybercriminals created a zero-day exploit with AI, the first example of artificial intelligence finding and hacking software ...
Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AI-developed ...
To protect the Pixel modem from zero-day attacks, Google focused on the DNS parser. As cellular features have migrated to data networks, DNS has become a core part of how phones work. Google explains ...
A report by GTIG shows threat groups are increasingly leveraging AI to scale attacks. The exploitation attempt was disclosed ...
Fake OpenAI Privacy Filter hit #1 on Hugging Face with 244,000 downloads, spreading infostealer malware to Windows users.
Google says a criminal hacking crew just gave a preview of AI-powered cybercrime. In new research, the company reports with "high confidence" that attackers used an artificial intelligence model to ...
U.S. cybersecurity agency CISA says the CopyFail bug is being actively used in hacking campaigns, and poses a major risk to servers and datacenters that rely on Linux.
After the CopyFail vulnerability gave root access from any user on almost all distributions last week, this week we’ve got DirtyFrag. This chains the vulnerability in CopyFail (xfrm-ESP) and ...
Publicly released exploit code for an effectively unpatched vulnerability that gives root access to virtually all releases of ...
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results