








Posted by Alan Coopersmith on May 11 CERT has now corrected their advisory to list version 2.92rel2 as well. | Posted by Alan Coopersmith on May 11 https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2026q2/018471.html https://www.kb.cert.org/vuls/id/471747 provides additio…
Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely developed with an artificial intelligence (AI) sys…
Executive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from…
The zero-day was designed to bypass 2FA and it was developed by a prominent cybercrime group. The post Google Detects First AI-Generated Zero-Day Exploit appeared first …
Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web administration tool was likely generated using AI.…
Google’s threat intelligence researchers have linked a zero-day exploit to AI-assisted development by a criminal group. The exploit targeted a popular open-source web-ba…
Posted by xw x on May 11 I have integrated my PoC into the selftests and submitted the patch to https://lore.kernel.org/all/20260511123721.13906-1-v3rdant.xiang () gmail… | Posted by xw x on May 11 The kernel team hasn't gotten back to me with a specific fix yet; instead, they've asked me to focus on integrating it into the BPF tests first.