Getty Images

Tip

What AI zero days mean for enterprise cybersecurity

AI's ability to find and exploit high-severity zero days at speed and scale presents both attackers and defenders with game-changing opportunity. Here's what CISOs should know.

The cybersecurity arms race has entered a new phase: Attackers are racing to harness the power of AI to discover zero-day vulnerabilities at unprecedented speed and scale.

For CISOs and other security leaders, this shift represents both an existential threat and an unprecedented opportunity. Enterprises must prepare for a world where the speed of vulnerability discovery and exploitation are measured in hours, rather than months. But while AI empowers attackers to find and exploit vulnerabilities faster, it also enables defenders to proactively hunt for weaknesses in their own systems.

AI zero days: Attacker POV

From a bad actor's perspective, AI transforms zero-day hunting into a fundamentally different game. Traditional attacks surface when vulnerabilities are discovered by chance or through relatively time-consuming and labor-intensive manual testing -- giving defenders at least some window to detect anomalous behavior.

But AI -- and its ability to analyze vast codebases, identify subtle patterns, automate complex testing processes and shrink exploitation windows -- changes the equation. Attackers can reap the following benefits:

  1. Expanded attack surface analysis. AI doesn't just test known attack vectors; it systematically maps entire codebases to identify non-obvious entry points that human researchers might never consider.
  2. Intelligent attack synthesis. AI can go beyond basic fuzzing to combine multiple minor vulnerabilities into sophisticated attack chains. AI learns from each attempt to refine its approach, much like an expert penetration tester with infinite focus and patience.
  3. Precision targeting with minimal footprint. AI lets attackers model a target's specific defenses and craft exploits that blend into normal operations, dramatically reducing the "noise" that typically alerts security teams to an intrusion.

AI zero days: Defender POV

Fortunately, AI enables companies to employ their own tactics to proactively reduce zero-day attack surfaces. Key AI-enabled defenses include the following:

  1. Automated vulnerability hunting during maintenance windows. Forward-thinking organizations are implementing "AI hunt cycles" -- scheduled downtime when AI tools systematically probe their own infrastructure. These tools mirror attacker techniques, mapping codebases, analyzing dependency chains and identifying vulnerable library combinations. If a vulnerability is discovered, defenders gain a crucial first-mover advantage: alerting their vendors through responsible disclosure. While awaiting critical patches, they can deploy compensating controls, such as web application firewalls, runtime protection and microsegmentation.
  2. Building AI-powered security validation frameworks. Rather than waiting for attacks, organizations can develop continuous testing environments where AI agents attempt to breach their own systems 24/7. These "red team bots" learn from each attempt, evolving their techniques to stay ahead of real attackers. The key is to create feedback loops where defensive AI learns from offensive AI, creating an internal arms race that hardens systems before external threats materialize. In some organizations, security validation might already be part of the defensive arsenal. Regardless, it needs to be a priority in the era of AI zero days.
  3. Predictive vulnerability modeling. AI can analyze historical vulnerability data, code patterns and threat intelligence to predict where zero days are most likely to emerge in an organization's tech stack. This allows security teams to proactively strengthen defenses around high-risk components and prioritize security investments with the greatest impact.

Ashwin Krishnan is the host and producer of StandOutIn90Sec, based in California. where he interviews tech leaders, employees and event speakers in short, high-impact conversations.

Dig Deeper on Threats and vulnerabilities