Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Posted on October 7, 2025October 7, 2025 By CWS

Oct 07, 2025Ravie LakshmananArtificial Intelligence / Software program Safety
Google’s DeepMind division on Monday introduced a synthetic intelligence (AI)-powered agent known as CodeMender that routinely detects, patches, and rewrites susceptible code to stop future exploits.
The efforts add to the corporate’s ongoing efforts to enhance AI-powered vulnerability discovery, comparable to Large Sleep and OSS-Fuzz.
DeepMind mentioned the AI agent is designed to be each reactive and proactive, by fixing new vulnerabilities as quickly as they’re noticed in addition to rewriting and securing current codebases with an purpose to remove complete lessons of vulnerabilities within the course of.

“By routinely creating and making use of high-quality safety patches, CodeMender’s AI-powered agent helps builders and maintainers give attention to what they do finest — constructing good software program,” DeepMind researchers Raluca Ada Popa and 4 Flynn mentioned.

“Over the previous six months that we have been constructing CodeMender, we have now already upstreamed 72 safety fixes to open supply initiatives, together with some as giant as 4.5 million traces of code.”
CodeMender, beneath the hood, leverages Google’s Gemini Deep Assume fashions to debug, flag, and repair safety vulnerabilities by addressing the basis explanation for the issue, and validate them to make sure that they do not set off any regressions.

The AI agent, Google added, additionally makes use of a big language mannequin (LLM)-based critique software that highlights the variations between the unique and modified code with a view to confirm that the proposed modifications don’t introduce regressions, and self-correct as required.
Google mentioned it additionally supposed to slowly attain out to maintainers of crucial open-source initiatives with CodeMender-generated patches, and solicit their suggestions, in order that the software can be utilized to maintain codebases safe.

The event comes as the corporate mentioned it is instituting an AI Vulnerability Reward Program (AI VRP) to report AI-related points in its merchandise, comparable to immediate injections, jailbreaks, and misalignment, and earn rewards that go as excessive as $30,000.
In June 2025, Anthropic revealed that fashions from varied builders resorted to malicious insider behaviors when that was the one solution to keep away from substitute or obtain their objectives, and that LLM fashions “misbehaved much less when it said it was in testing and misbehaved extra when it said the state of affairs was actual.”

That mentioned, policy-violating content material era, guardrail bypasses, hallucinations, factual inaccuracies, system immediate extraction, and mental property points don’t fall beneath the ambit of the AI VRP.
Google, which beforehand arrange a devoted AI Pink Group to deal with threats to AI programs as a part of its Safe AI Framework (SAIF), has additionally launched a second iteration of the framework to give attention to agentic safety dangers like information disclosure and unintended actions, and the required controls to mitigate them.
The corporate additional famous that it is dedicated to utilizing AI to reinforce safety and security, and use the know-how to present defenders a bonus and counter the rising menace from cybercriminals, scammers, and state-backed attackers.

The Hacker News Tags:Code, Doesnt, Find, Googles, Patch, Rewrites, Vulnerabilities

Post navigation

Previous Post: Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses
Next Post: BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Related Posts

Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild The Hacker News
Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The Hacker News
Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover The Hacker News
Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker News
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems The Hacker News
Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News