Scan to download
BTC $81,137.71 -0.10%
ETH $2,309.92 -1.50%
BNB $661.94 +1.13%
XRP $1.46 +0.53%
SOL $96.37 +1.17%
TRX $0.3497 +0.00%
DOGE $0.1106 +0.60%
ADA $0.2775 -0.01%
BCH $443.81 -2.93%
LINK $10.47 -0.75%
HYPE $41.27 -2.45%
AAVE $100.10 -0.19%
SUI $1.28 -1.58%
XLM $0.1661 -0.05%
ZEC $555.59 -6.06%
BTC $81,137.71 -0.10%
ETH $2,309.92 -1.50%
BNB $661.94 +1.13%
XRP $1.46 +0.53%
SOL $96.37 +1.17%
TRX $0.3497 +0.00%
DOGE $0.1106 +0.60%
ADA $0.2775 -0.01%
BCH $443.81 -2.93%
LINK $10.47 -0.75%
HYPE $41.27 -2.45%
AAVE $100.10 -0.19%
SUI $1.28 -1.58%
XLM $0.1661 -0.05%
ZEC $555.59 -6.06%

Google hackers use AI technology to build zero-day vulnerabilities that bypass two-factor authentication

2026-05-12 10:26:58
Collection

According to Decrypt, Google's Threat Analysis Group confirmed that cybercriminals used an AI model to discover and exploit a zero-day vulnerability in a popular open-source web management tool that could bypass two-factor authentication. Google stated that this is the first time the company has confirmed AI-assisted zero-day vulnerability development in a real-world environment. Before attackers could exploit it on a large scale, Google worked with the affected vendor to patch the vulnerability. Google's report noted that the vulnerability was a logic error, where the software trusted a condition that could bypass two-factor authentication. Unlike traditional scanners that look for crashes or error codes, AI analyzed the expected behavior of the software and detected logical contradictions, allowing attackers to bypass security checks without compromising encryption.

app_icon
ChainCatcher Building the Web3 world with innovations.