Profile Picture
  • All
  • Search
  • Images
  • Videos
  • Maps
  • News
  • Copilot
  • More
    • Shopping
    • Flights
    • Travel
  • Notebook
  • Top stories
  • Sports
  • U.S.
  • Local
  • World
  • Science
  • Technology
  • Entertainment
  • Business
  • More
    Politics
Order byBest matchMost fresh
  • Any time
    • Past hour
    • Past 24 hours
    • Past 7 days
    • Past 30 days

AI, Google and 2FA bypass exploit

Digest more
Top News
Overview
Interesting Engineering on MSN · 20h
Google detects first AI-developed zero-day exploit tied to mass cyberattack
In what could be the first confirmed case of hackers using AI to develop

Continue reading

CSO Online · 2d
Google discovers weaponized zero-day exploits created with AI
The Next Web · 21h
Google found the first AI-generated zero-day exploit. It stopped the attack before it started.
 · 1d
Google intercepts a massive cyberattack powered by first-ever AI-generated zero-day exploit
Google says it may have prevented a major cyberattack campaign by state backed hackers for the first time using a a zero-day exploit developed by AI in a ‘mass exploitation event’.

Continue reading

 · 1d
Google says it likely thwarted effort by hacker group to use AI for 'mass exploitation event'
newsbytesapp.com · 1d
Google warns AI may help hackers exploit 0-day security flaws
CSO Online
2d

New ‘Dirty Frag’ exploit targets Linux kernel for root access

The actively exploited flaw builds on Dirty Pipe and Copy Fail techniques to overwrite page cache and gain full system control.
Bleeping Computer
1y

New ARM 'TIKTAG' attack impacts Google Chrome, Linux systems

A new speculative execution attack named "TIKTAG" targets ARM's Memory Tagging Extension (MTE) to leak data with over a 95% chance of success, allowing hackers to bypass the security feature. The paper, co-signed by a team of Korean researchers from ...
Hosted on MSN
2h

Google thwarts first AI-created zero-day 2FA bypass exploit

First AI zero-day: Google detected the first confirmed case of a zero-day exploit developed with AI, targeting a 2FA bypass in an open-source admin tool. Planned mass attack: Cybercriminals intended to use the exploit for large-scale attacks, but Google ...
The Hacker News
5d

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Dirty Frag exposes Linux systems to root escalation through chained kernel flaws, impacting Ubuntu, RHEL, Fedora, and others.
Security Boulevard
5d

CVE-2026-23918: Apache HTTP/2 Double-Free Vulnerability with Possible RCE

CVE-2026-23918 is a high-severity Apache HTTP/2 double-free flaw affecting version 2.4.66. Learn the root cause, who's at risk, and how to patch or mitigate it. The post CVE-2026-23918: Apache HTTP/2 Double-Free Vulnerability with Possible RCE appeared first on Indusface.
Dark Reading
1mon

DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike

A new iOS exploit chain is being used by attackers around the globe, and it's built for espionage actors and financially motivated attackers alike. Google, iVerify, and Lookout this week published research concerning "DarkSword," an exploit chain targeting ...
  • Privacy
  • Terms