<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Zero-Day on Juan Carlos Munera</title><link>https://cybersecpro.me/tags/zero-day/</link><description>Recent content in Zero-Day on Juan Carlos Munera</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Juan Carlos Munera</copyright><lastBuildDate>Wed, 13 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://cybersecpro.me/tags/zero-day/index.xml" rel="self" type="application/rss+xml"/><item><title>How Hackers Talked an AI Into Helping Them Build a Zero-Day</title><link>https://cybersecpro.me/posts/ai-jailbreak-zero-day-google-gtig/</link><pubDate>Wed, 13 May 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/ai-jailbreak-zero-day-google-gtig/</guid><description>Google&amp;rsquo;s threat researchers caught the first zero-day exploit they believe was built with AI assistance. The technique attackers used to get the AI to help is the part worth understanding.</description></item><item><title>Project Glasswing: What Happens When AI Can Find and Exploit Vulnerabilities Faster Than You Can Patch</title><link>https://cybersecpro.me/posts/project-glasswing-ai-vulnerability-discovery/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/project-glasswing-ai-vulnerability-discovery/</guid><description>Anthropic launched Project Glasswing with 12 major tech companies, using its unreleased Claude Mythos Preview model to find and patch zero-day vulnerabilities at a scale and speed that didn&amp;rsquo;t exist six months ago. The implications for vulnerability management, patching cycles, and defensive security programs are enormous.</description></item><item><title>Two FortiClient EMS Zero-Days in Two Weeks: Why Your Endpoint Management Server Is the Target</title><link>https://cybersecpro.me/posts/forticlient-ems-double-zero-day/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/forticlient-ems-double-zero-day/</guid><description>Two critical unauthenticated vulnerabilities in Fortinet&amp;rsquo;s FortiClient EMS were actively exploited within weeks of each other in March and April 2026. Attackers timed the latest zero-day for Easter weekend. FortiClient EMS manages security policies, VPN configurations, and compliance controls across entire endpoint fleets, making it one of the highest-value targets in an enterprise environment.</description></item></channel></rss>