Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • Copilot
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
  • Top stories
  • Sports
  • U.S.
  • Local
  • World
  • Science
  • Technology
  • Entertainment
  • Business
  • More
    Politics
Order byBest matchMost fresh
  • Any time
    • Past hour
    • Past 24 hours
    • Past 7 days
    • Past 30 days

AI, Google and Zero-Day Exploit

Digest more
Top News
Overview
TweakTown · 2d
Google finds hackers using AI to discover and develop a zero-day exploit for the first time for mass attacks
Google has not identified which LLM was used to develop the zero-day exploit, but has confirmed that its own Gemini AI was not involved.

Continue reading

 · 1d
Google Says Hackers Used AI to Build Zero-Day Exploit
 · 2d
Google disrupts hackers using AI to exploit an unknown weakness in a company’s digital defense
 · 1d
Journalists sue Google for allegedly using their voices in AI training
Google (GOOGL.O) has been sued by a group of award-winning journalists, podcasters and audiobook narrators in Illinois federal court for allegedly misusing ​recordings of their voices to train the art...

Continue reading

 · 1d
Google launches new Android security feature to help uncover spyware attacks
 · 1d
Google thwarts suspected hacker attempt to use AI for large-scale exploitation
13h

Microsoft Windows Alert—Angry Hacker Drops 2 New Zero-Day Exploits

The latest Microsoft Patch Tuesday rollout featured no zero-days. However, an angry hacker has just dropped two new 0-day exploits targeting Windows users.
2d

Linux bitten by second severe vulnerability in as many weeks

Linux users have been bitten by yet another vulnerability that gives containers and untrusted users the ability to gain root access, marking the second time in as many weeks that a severe threat has caught defenders off guard.
Morning Overview on MSN
13h

Google warns that exploits now routinely arrive before patches — and attackers hand off access to other groups in under 22 seconds

In early 2025, Google’s Mandiant incident-response team documented something that upends a basic assumption of cybersecurity: in a growing number of cases, attackers are building working exploits for software vulnerabilities before the vendor has even shipped a fix.
The Hacker News
5d

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Dirty Frag exposes Linux systems to root escalation through chained kernel flaws, impacting Ubuntu, RHEL, Fedora, and others.
SecurityWeek
2d

New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks

Dirty Frag, a new local privilege escalation vulnerability affecting major Linux distributions, may already be exploited in the wild.
Morning Overview on MSN
1d

Hackers now weaponize vulnerabilities 10 hours after disclosure on average — down from days just two years ago

When Palo Alto Networks’ Unit 42 team published its 2024 Incident Response Report, one number stood out: attackers were exploiting newly disclosed software flaws in a median time of roughly 10 hours.
The Hacker News
1d

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution. Exim is an open-source Mail Transfer Agent (MTA) designed for Unix-like systems to receive,
  • Privacy
  • Terms