Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

AI used to develop working zero-day exploit, researchers warn

By CIO Dive by By CIO Dive
May 11, 2026
Home Enterprise IT
Share on FacebookShare on Twitter


This audio is auto-generated. Please let us know if you have feedback.

A threat actor was able to leverage AI to develop a working zero-day exploit, in what is believed to be the first such successful use of the technology, according to a report released Monday by Google Threat Intelligence Group (GTIG). 

The effort was an attempt to launch a mass exploitation event, the report read, but ultimately was unsuccessful, as Google discovered it before the vulnerability was weaponized. 

GTIG notified the developer of the exploit and a patch was issued to address the potential threat. Researchers do not believe that Mythos was used in the development process. 

“AI can review the underlying logic, context, and flow of code at scale to discover vulnerabilities, John Hultquist, chief analyst at GTIG told Cybersecurity Dive, via email. “It can also be used to build working exploits which are a significant hurdle.”

The incident highlights a growing trend by state-linked and financially motivated threat groups using AI to scale and accelerate hacking campaigns and exploit flaws in widely used applications. GTIG researchers caution they have seen several other attempts to use AI to develop exploits and expect there will be other operations employing a variety of models. 

Threat groups affiliated with North Korea and China have shown significant interest in exploiting AI to discover vulnerabilities, according to the GTIG report. 

For example, a North Korea-linked hacker tracked as APT45 has used AI to analyze a wide range of vulnerabilities using thousands of repetitive prompts and validate proof of concept exploits, the report stated.  

In a recent case involving criminal actors, a group of hackers joined forces to plan a mass exploitation operation. A zero-day vulnerability was implemented in a Python script, which enabled the hacker to bypass two-factor authentication on a widely used open-source system administration tool, GTIG said. 

Researchers worked with the vendor to disclose the vulnerability and disrupt the operation. 

The report follows an attempt by an unknown hacker to breach a Mexican water utility using widely used AI tools, including Claude. 



Source link

By CIO Dive

By CIO Dive

Next Post
Tech CEOs Risk Slower Growth and Weaker Investor Confidence From Misaligned Front-Office Metrics, Says Info-Tech Research Group

Tech CEOs Risk Slower Growth and Weaker Investor Confidence From Misaligned Front-Office Metrics, Says Info-Tech Research Group

Recommended.

Ilya Sutskever Stands by His Role in Sam Altman’s OpenAI Ouster: ‘I Didn’t Want It to Be Destroyed’

Ilya Sutskever Stands by His Role in Sam Altman’s OpenAI Ouster: ‘I Didn’t Want It to Be Destroyed’

May 12, 2026
JPMorgan Chase is set to report first-quarter earnings – here’s what the Street expects

JPMorgan Chase is set to report first-quarter earnings – here’s what the Street expects

April 11, 2025

Trending.

Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

April 15, 2026
2025 Wired, WLAN Gartner Magic Quadrant: Cisco Drops To Challenger, NaaS Specialists Join

2025 Wired, WLAN Gartner Magic Quadrant: Cisco Drops To Challenger, NaaS Specialists Join

July 14, 2025
CTIA Names Preston Wise Senior Vice President of External and State Affairs

CTIA Names Preston Wise Senior Vice President of External and State Affairs

May 6, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio