Retrieval-augmented generation (RAG) has become the de facto standard for grounding large language models (LLMs) in private ...
The software supply chain is the new ground zero for enterprise cyber risk. Don't get caught short - SiliconANGLE ...
Google reported the first confirmed AI-assisted zero-day exploit, raising new concerns about logic flaws, supply chain risk, ...
Record drug shortages (≥216 active in the US in 2025) expose limited end-to-end visibility, motivating AI-driven early risk detection and coordinated mitigation across fragmented networks.
Attackers compromised the official Mistral AI Python package on PyPI along with hundreds of other widely-used developer packages, exposing GitHub tokens, ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
Google's GTIG identified the first zero-day exploit developed with AI and stopped a mass exploitation event. The report documents state actors using AI for vulnerability research and autonomous ...
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
Security researchers have uncovered covert infostealer malware hidden in one of the top-ranking repositories on Hugging Face, ...
For the first time, Google has identified a zero-day exploit believed to have been developed using artificial intelligence.
Google found the first known zero-day exploit it believes was built using AI. The exploit targets two-factor authentication (2FA) on an open-source admin tool. State sponsored hackers from China and ...
The 2FA bypass exploit stemmed from a faulty trust assumption, providing evidence of AI reasoning that can discover ...