Microsoft Exchange users are urged to mitigate a zero-day vulnerability that CISA has confirmed is under active exploitation.
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
Dirty Frag, a critical Linux kernel zero-day vulnerability with no patch and giving hackers root, has gone public after an ...
The Google Threat Intelligence Group today released its annual 2024 zero-day trends report, surprisingly finding that there was a reduction in zero-day threats exploited in the wild last year despite ...
Google's GTIG identified the first zero-day exploit developed with AI and stopped a mass exploitation event. The report documents state actors using AI for vulnerability research and autonomous ...
The exploit code was almost too neat. When Google’s Threat Intelligence Group flagged a previously unknown software ...
AI tools are revolutionizing cyberattacks, lowering barriers for attackers and enabling sophisticated exploits, while ...
Update 10/6/25 11:15 AM ET: Updated story with more information on the leaked Oracle source code and the leaking of the exploit. Oracle is warning about a critical E-Business Suite zero-day ...
With the popularity of the Netflix series Zero Day among cybersecurity experts and others, the show has evolved into an interesting reference for comprehending the far-reaching effects of zero-day ...
Cybercriminals used an AI model to find and weaponize a previously unknown software flaw, Google's threat team confirmed ...
Williams pleaded guilty in October to selling eight stolen zero-day exploits to the Russian cyber-tools broker for $1,300,000 in cryptocurrency. U.S. District Court Judge Loren AliKhan sentenced ...
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over systems, with no patch yet available. Attackers have been exploiting a ...