Military & Security

Google says criminals used AI to build a working zero-day exploit for the first time

· May 11, 2026
Google says criminals used AI to build a working zero-day exploit for the first time

What happened

Google’s Threat Intelligence Group confirmed criminal hackers used AI to create a functioning zero-day exploit for the first time. The group deployed artificial intelligence to develop a Python-based exploit that bypasses two-factor authentication protections. This marks a new frontier in cyberattacks, where AI tools are no longer just leveraged defensively but actively weaponized by sophisticated threat actors.

The risk

Zero-day exploits are vulnerabilities unknown to software creators and unpatched, making them the most dangerous type of cyberattack. Combining AI with zero-days means faster discovery and development of exploits with less trial and error. Attackers can automate complex coding tasks, potentially increasing the volume and quality of attacks while reducing reliance on human expertise. This raises the cost and difficulty of defending critical systems.

Why it matters

For security teams, this development signals a step-change in attacker capabilities. The ease and speed that AI provides will force defenders to accelerate vulnerability scanning, threat hunting, and incident response. Two-factor authentication, often seen as a reliable safety net, now faces new challenges, requiring organizations to adopt additional layers of protection and continuous monitoring. For businesses, this raises cyber risk and insurance costs while tightening the window to detect and remediate breaches.

Who should pay attention

Security professionals, CISO teams, and IT operators in high-risk sectors like finance, healthcare, and critical infrastructure must update threat models to include AI-augmented attacks. Software developers should prioritize security hardening, especially for authentication systems vulnerable to these new exploits. Investors and boards need to factor rising cyber risk into their technology strategies and risk management frameworks.

What to watch next

Expect increased investment in AI-powered defense tools, including anomaly detection and automated patching systems. Look for new security standards targeting AI-related threats and stronger regulations on exploit disclosure. Monitoring evolving attacker techniques will be critical as AI tools become more accessible, potentially broadening the pool of cybercriminals capable of launching advanced zero-day attacks.

AI Quick Briefs Editorial Desk

Stay ahead of AI Get the most important AI news delivered to your inbox — free.