Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Hackers use new hexastric-AI tool rapidly take advantage of N-Day defects
    Security

    Hackers use new hexastric-AI tool rapidly take advantage of N-Day defects

    PineapplesUpdateBy PineapplesUpdateSeptember 4, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hackers use new hexastric-AI tool rapidly take advantage of N-Day defects
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers use new hexastric-AI tool rapidly take advantage of N-Day defects

    Hackers are rapidly using a new AI-managed aggressive safety structure, which are to take advantage of new disclosure N-Day defects called Hexastarike-AE in new attacks.

    This activity has been informed by the Czechpoint Research, which saw a significant fuck on the dark web around the hexastric-AI, which is associated with rapid weakening of newly revealed weakens including CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424.

    According to the data of Shadowseerver Foundation, About 8,000 closing points Be below 28,000 last week to be unsafe for CVE-2025-7775 by September 2, 2025.

    Power in wrong hands

    Hexstrike-II is a legitimate red teaming tool created by Cyber ​​Safety Researcher Muhammad Osama, which automatically automatically automatically enables the integration of AI agents to automatically automatically automatically automatically automatically run 150 cyber cyber security equipment for penetrated testing and discovery of vulnerability.

    “Hexastric AI works with human-in-loop interaction via AI MCP, which creates a continuous cycle of signals, analysis, execution and response,” Reads its manufacturer,

    The client of the hexastarik-AI has a retro logic and recovery handling facility to reduce the impacts of failures in any individual steps on its complex operations. Instead, it automatically withdraws its configuration or adjusts until the operation is successfully completed.

    The tool is open-source and Available on github For the previous month, where it has already put 1,800 stars and more than 400 forks.

    Unfortunately, it has attracted the attention of hackers who have started using it in their attacks.

    According to the checkpoint, the hackers started discussing the tool on the hacking forum, where they discussed how to deploy the Hexstick-AI to take advantage of the Citrix Netscaler Adc and Gateway zero-day weaknesses mentioned within hours of their disclosure.

    Discussion about using hexstrike-I against Citrix Endpoints
    Discussion about using hexstrike-I against Citrix Endpoints
    Source: Checkpoint

    The danger actors allegedly used it to achieve informal distance code execution through CVE -2025-7775 and then abandoned the webshell on compromised equipment, offering Netscaler examples for sale for sale.

    Czechpoint believes that the attackers used new painting framework to automate their exploitation series, scanning, prepare adventures, pay and maintain perseverance.

    List of weak netskeller examples
    List of weak netskeller examples
    Source: Checkpoint

    Although the actual partnership of the hexastric-AI in these attacks has not been confirmed, N-Day Flaw exploitation time from such automation levels can be reduced by several days to a few minutes.

    This type of development system will already leave administrators with small patching windows and even will be less time before the attacks begin.

    “The window between disclosure and large -scale exploitation shrinks dramatically.” Comment point Recently revealed on Citrix Flaw.

    “CVE-2025-7775 is already being exploited in the wild, and with hexastric-AI, the amount of attacks will increase only in the coming days.”

    Although rapid patching is important, this paradigm brought by the structure of the AI-powered attack is even more important to maintain a strong, overall security trend.

    The Czech point has recommended the guards to focus on initial warnings through threatening intelligence, AI-driven rescue and adaptive identity.


    Picus Blue Report 2025

    The passwords broke in 46% of the atmosphere, almost doubled by 25% last year.

    Picus Blue Report 2025 Now get a wider look at more conclusions on prevention, detection and data exfIs.

    advantage defects hackers hexastricAI NDay rapidly tool
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFür cyberattacken gewappnet – krisenkommunikation nach plan
    Next Article Report: 70% of iPhone users considering upgrade in iPhone 17 – and it is not related to AI
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    I used Microsoft’s free Windows 11 Battery Health tool to diagnose my PC — and got useful results

    January 17, 2026
    Startups

    The Kindle I never expected to use for work is now my top productivity tool — here’s why

    December 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.