CyberCrisis🇨🇳China🇷🇺Russia11d agoExecutive Summary Since our February 2026 report on AI-related threat activity, Google Threat Intelligence Group (GTIG) has continued to track a maturing transition from nascent AI-enabled operations to the industrial-scale application of generative models within adversarial workflows. This report, based on insights derived from Mandiant incident response engagements, Gemini, and GTIG’s proactive research, highlights the dual nature of the current threat environment where AI serves as both a sophisticated engine for adversary operations and a high-value target for attacks. We explore the following developments: Vulnerability Discovery and Exploit Generation: For the first time, GTIG has identified a threat actor using a zero-day exploit that we believe was developed with AI.6.1/10·Mandiant Threat IntelligencePrimary Source ↗
CyberCrisis🇲🇱Mali15d agoResearchers have found that malicious code repositories can silently execute commands through AI coding assistants including Claude Code, Cursor, Gemini CLI, and GitHub Copilot CLI, with inadequate warning prompts doing little to stop the attack.5.5/10·Dark Reading·MaliPrimary Source ↗Details →