<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Zero-Day on Security Unlocked</title><link>https://securityunlocked.com/tags/zero-day/</link><description>Recent content in Zero-Day on Security Unlocked</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 14 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://securityunlocked.com/tags/zero-day/index.xml" rel="self" type="application/rss+xml"/><item><title>AI Writes the Exploit: UNC2814's Gemini Zero-Day and the Automation Gap That Just Closed</title><link>https://securityunlocked.com/weekly-intelligence/ai-writes-the-exploit-unc2814s-gemini-zero-day-and-the-automation-gap-that-just-closed/</link><pubDate>Thu, 14 May 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/weekly-intelligence/ai-writes-the-exploit-unc2814s-gemini-zero-day-and-the-automation-gap-that-just-closed/</guid><description>Google GTIG&amp;rsquo;s confirmation of the first AI-generated zero-day deployed in a live attack closes the loop on Monday&amp;rsquo;s AI agent vulnerability wave, connecting the attack surface (vulnerable AI frameworks) to the attack tool (AI-generated exploits) in the same reporting week.</description></item><item><title>Palo Alto Captive Portal Zero-Day Under Active Chinese-Linked Exploitation, First Patches May 13</title><link>https://securityunlocked.com/alerts/palo-alto-captive-portal-zero-day-under-active-chinese-linked-exploitation-first-patches-may-13/</link><pubDate>Fri, 08 May 2026 13:00:00 +0000</pubDate><guid>https://securityunlocked.com/alerts/palo-alto-captive-portal-zero-day-under-active-chinese-linked-exploitation-first-patches-may-13/</guid><description>CVE-2026-0300 (CVSS 9.3) is an unauthenticated, root-level RCE in the PAN-OS User-ID Authentication Portal of PA-Series and VM-Series firewalls, under active exploitation by a likely China-aligned cluster Unit 42 tracks as CL-STA-1132. First hotfixes ship May 13. Anything with the Captive Portal exposed to untrusted networks needs immediate mitigation.</description></item><item><title>LiteLLM's 36-Hour Exploitation Window Confirms the AI Attack Surface Has Moved Up the Stack</title><link>https://securityunlocked.com/weekly-intelligence/litellms-36-hour-exploitation-window-confirms-the-ai-attack-surface-has-moved-up-the-stack/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/weekly-intelligence/litellms-36-hour-exploitation-window-confirms-the-ai-attack-surface-has-moved-up-the-stack/</guid><description>The rapid exploitation of CVE-2026-42208 in LiteLLM marks the first confirmed weaponization of the AI API proxy layer, while TeamPCP&amp;rsquo;s new ransomware partnership turns out to be a wiper with no recovery path.</description></item><item><title>Three Critical Exploits Hit Management Planes and Endpoints</title><link>https://securityunlocked.com/alerts/three-critical-exploits-hit-management-planes-and-endpoints/</link><pubDate>Sun, 26 Apr 2026 16:00:00 +0000</pubDate><guid>https://securityunlocked.com/alerts/three-critical-exploits-hit-management-planes-and-endpoints/</guid><description>Three critical vulnerabilities under active exploitation target FortiClient EMS, Adobe Acrobat Reader, and nginx-ui, collectively exposing enterprise management planes and endpoints to unauthenticated remote code execution.</description></item><item><title>Defenders Under Siege: How Adversaries Turned Security Tools Into Weapons This Week</title><link>https://securityunlocked.com/articles/defenders-under-siege-how-adversaries-turned-security-tools-into-weapons-this-week/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>https://securityunlocked.com/articles/defenders-under-siege-how-adversaries-turned-security-tools-into-weapons-this-week/</guid><description>Three incidents this week reveal the same strategic pattern: attackers turning trusted defensive infrastructure into weapons. Microsoft Defender zero-days, the Trivy scanner compromise that breached the European Commission, and UNC6783&amp;rsquo;s live-chat social engineering all exploit a cognitive constant: defenders don&amp;rsquo;t question the tools they depend on.</description></item></channel></rss>