Google’s Threat Analysis Group (TAG) has confirmed the first documented case of a zero‑day exploit fully designed and deployed by artificial intelligence, targeting a previously unknown vulnerability in the Linux kernel’s memory management system. The AI-driven attack framework, dubbed “Strix,” uses an automated toolset called “Hexstrike” to discover and weaponize software flaws without human coding. Activity was linked to advanced persistent threat group UNC2814 after a major East Asian cybersecurity firm detected anomalous traffic against Japanese and U.S. technology companies. Investigators say Strix located a TP‑Link OFTP firmware buffer overflow in under fifteen minutes, signaling a major shift in offensive cyber capabilities.
Prepared by Jonathan Pierce and reviewed by editorial team.
这次人工智能驱动的攻击可能会改变网络安全。它在几分钟内就发现了并利用了一个软件漏洞。这比任何人类都要快。如果您的设备运行的是 Linux,它们可能会面临风险。请定期检查更新以确保安全。
人工智能现在已成为网络战中的参与者。它不再仅仅是一个工具,而是一个活跃的威胁。这对每个人来说都是一个警钟。网络安全不再仅仅是人类之间互相智斗。如果你认识科技界的人,值得转发。
未在源中指定。
未在源中指定。
No left-leaning sources found for this story.
No right-leaning sources found for this story.
Comments