When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

We’re still very much in the early days of the AI revolution.

Now, as interesting as these exploits are, what’s truly mind-blowing is how they were discovered.

Blue and red wireframe cameras on a digital grid

Which zero-days did GreyNoise find?

First, let’s talk about the exploits GreyNoise uncovered.

They’re tracked asCVE-2024-8956andCVE-2024-8957respectively.

A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.

How did GreyNoise find the zero-days?

Much of this work involves dedicated support agents analyzing unusual web traffic flagged by traditional rule-based systems.

We’re talking millions of web requests per day.

“That’s where our researchers come in.

The AI-powered tool and the researchers work together to make an unmanageable amount of data and complexity actionable.

It’s a far cry from the doom and gloom we’ve seen regarding AI stories in the past.

For more context, I’ll let Andrew Morris, Founder and Chief Architect at GreyNoise Intelligence, explain.

We caught it before it could be widely exploited, reported it, and got it patched.

The attacker put a lot of effort into developing and automating this exploit, and they hit our sensors.

Today its a camera, but tomorrow it could be a zero-day in critical enterprise software.

This discovery proves that AI is becoming essential for detecting and stopping sophisticated threats at scale.

For more information, you might check out GreyNoise’s blog posthere, as well as theirTwitterandLinkedInpages.

Inexperienced script kiddies can quickly create custom botnet scripts using code generators without significant development experience, too.

Bots have dominated every sphere of discourse you could think of and are being used to wage political warfare.

What can you do to protect against Zero-days?

There’s no easy fix to stop your unit from being compromised by a zero-day attack.