Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • Copilot
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
  • Top stories
  • Sports
  • U.S.
  • Local
  • World
  • Science
  • Technology
  • Entertainment
  • Business
  • More
    Politics
Order byBest matchMost fresh
  • Any time
    • Past hour
    • Past 24 hours
    • Past 7 days
    • Past 30 days

Hackers use AI to create worst security flaw for 1st time

Digest more
Top News
Overview
Highlights
 · 1d
Google says hackers used AI to develop a major security flaw
Cybercriminals were recently caught using a zero-day exploit believed to have been discovered and developed by artificial intelligence, Google announced Monday.

Continue reading

 · 5h
Google Says Hackers Used AI to Build Zero-Day Exploit
 · 10h · on MSN
Hackers use AI to create worst security flaw for first time
 · 1d
Google Disrupts Hackers Using AI to Exploit an Unknown Weakness in a Company's Digital Defense
Google said Monday that it had disrupted a criminal group’s attempt to use artificial intelligence to exploit another company’s previously unknown digital vulnerability, adding to heightened worries a...

Continue reading

 · 1d
Hackers Used AI to Build Zero-Day Attack, Google Researchers Say
eWeek · 7h
Google Reports First AI-Built Zero-Day Exploit as Cyber Model Fears Grow
 · 1d
Google says it likely thwarted effort by hacker group to use AI for 'mass exploitation event'
"The criminal threat actor planned to use it in a mass exploitation event but our proactive counter discovery may have prevented its use," Google wrote in the post, without disclosing the name of the ...

Continue reading

 · 1d
Google disrupts AI hackers exploiting unknown weakness in firm’s digital defence
 · 1d
Google says hacker used Mythos-like AI for software tool exploit
1d

The Real AI Security Risk Isn't Data Leakage. It's What Your Agents Can Do

Agentic AI has moved the threat boundary inside the enterprise. Mindgard's Aaron Portnoy explains why authority, not access, is now the primary vulnerability.
9h

Push Security Launches AI-Native Agentic Threat Hunting for the Browser, Redefining Detection & Response in the Secure Enterprise Browser Market

Push Security, the most powerful AI-native security tool in the browser, today announced a major evolution of its platform, introducing an AI-native, agentic approach to threat hunting and detection engineering within its Secure Enterprise Browser extension.
eWeek
5h

OpenAI’s Daybreak Uses Codex Security to Hunt Software Vulnerabilities

OpenAI launched Daybreak, an AI cyber defense initiative that uses Codex Security to help teams find, validate, and fix software flaws.
4d

Rethinking Security For AI Systems

While traditional security is all about enforcing control, AI security is about building a solid understanding of the behavior of AI systems.
SecurityWeek
14h

TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack

Over 170 TanStack, Mistral AI, OpenSearch, UiPath, and other packages were affected in a new Mini Shai-Hulud supply chain attack.
The Manila Times
11h

SANS Institute Releases AI Security Maturity Model to Close the Gap Between Enterprise AI Adoption and the Governance to Control It

Built in direct response to community demand, the SANS AI Security Maturity Model™ gives security leaders a stage-by-stage operational framework, including original guidance for agentic AI, mapped to NIST AI RMF,
1d

Lyrie Completes $2 Million Preseed Round to Build the Security Layer for the AI Agent Era

Dubai, UAE, May 11th, 2026, FinanceWireLyrie.ai, the autonomous cybersecurity platform developed by OTT Cybersecurity LLC,
CNET on MSN
1mon

Anthropic Says Its New AI Model Is So Good at Finding Security Risks, You Can't Use It

Anthropic Says Its New AI Model Is So Good at Finding Security Risks, You Can't Use It
Homeland Security Today
5mon

CISA and Partners Issue Joint Guide to Advance Secure Integration of AI in Operational Technology

The Cybersecurity and Infrastructure Security Agency and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), in collaboration with U.S. and international government partners, have published the Principles for the Secure ...
  • Privacy
  • Terms