

From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
Sep 6, 2025
Nahman Khayet, an Israeli researcher known for automating exploit creation with AI, shares groundbreaking insights into the evolving landscape of cybersecurity. He reveals how his method slashes exploit development time from 192 days to just 15 minutes, raising alarms about the future of digital security. The conversation dives into the importance of the CVE Database and emphasizes the necessity for organizations to bolster their defenses against quicker, AI-driven threats. Khayet also discusses the dual challenge of fast coding and maintaining secure practices.
AI Snips
Chapters
Transcript
Episode notes
CVE Is The Industry’s Single Source For Vulnerabilities
- The CVE database centralizes vulnerability tracking and provides standardized identifiers and severity measures.
- MITRE runs CVE with US government support and it underpins industry-wide patch coordination.
The Old Defensive Buffer From CVE Publication
- Historically there is a time buffer between CVE publication and real-world exploits, giving defenders days to months.
- That buffer averaged around 170–192 days, letting organizations plan patches and remediations.
Researchers Turned CVEs Into Exploits In Minutes
- Two Israeli researchers built a proof-of-concept that automated exploit generation with AI.
- Their work reduced average exploit development time from months to about 15 minutes.