{"id":36129,"date":"2026-05-12T04:25:14","date_gmt":"2026-05-12T03:25:14","guid":{"rendered":"https:\/\/kaizen-blog.org\/?p=36129"},"modified":"2026-05-12T04:25:18","modified_gmt":"2026-05-12T03:25:18","slug":"die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da","status":"publish","type":"post","link":"https:\/\/kaizen-blog.org\/en\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/","title":{"rendered":"The Machines Are Now Searching for Vulnerabilities Themselves - And the First Real Warning Is Already Here"},"content":{"rendered":"<p>For years it sounded like one of those futuristic warnings from cybersecurity conferences that people briefly read and then forgot. Someday criminal hackers would use artificial intelligence to independently discover security flaws no human had ever found before. Someday programs would begin searching for the internet\u2019s weaknesses on their own. That moment now appears to have arrived. Google published a report on Monday that is causing significant alarm throughout the cybersecurity industry. According to the company, a criminal hacking group attempted to prepare a large-scale cyberattack with the help of an AI model. The target was apparently a previously unknown vulnerability in a widely used open-source management system. Such weaknesses are considered especially dangerous in the industry because even the developers themselves are unaware of them. That is why they are known as so-called zero-day vulnerabilities.<\/p>\n\n\n\n<p>According to Google, the attackers used a model not only to identify the vulnerability but also to directly prepare it for an attack. Security researchers have warned about exactly this scenario for years. Until now, the search for such vulnerabilities was considered extremely labor-intensive. Specialized groups often spent months working on individual systems. Now part of that work may be becoming automated. What is especially remarkable is not even the technical side itself, but the speed at which the situation is changing. Only a few years ago, zero-day vulnerabilities were considered rare commodities capable of fetching millions of dollars on illegal markets. Now cybersecurity firms openly say that modern AI systems can uncover vulnerabilities on a massive scale.<\/p>\n\n\n\n<p>The pressure intensified further after the company Anthropic unveiled its new model Mythos. According to Anthropic, the system identified thousands of unknown vulnerabilities in major operating systems and internet browsers - including flaws that may have remained undiscovered for decades. Precisely for that reason, the model was not publicly released, but instead made available only to selected companies and government agencies in the United States and the United Kingdom. Google says it detected the recent attack in time. The vulnerability was patched before major damage could occur. However, the company has not disclosed the affected software. The responsible hacking group also officially remains unknown. The only confirmed detail is that the attack apparently used a Python script and aimed to bypass two-factor authentication. To do so, the attackers would additionally have needed valid credentials such as usernames or passwords.<\/p>\n\n\n\n<p>John Hultquist of the Google Threat Intelligence Group nevertheless describes the incident as a turning point. He said it was the first concrete case in which there is high confidence that artificial intelligence was actively used to discover and prepare a previously unknown vulnerability. In his words, this is likely only \u201cthe tip of the iceberg.\u201d Particularly disturbing is how Google claims to have identified the use of AI. According to the report, the code contained unusual explanatory comments and phrasing that experienced human developers would normally never include. Rob Joyce, former cybersecurity director at the NSA, explained that AI-generated code now leaves traces that can sometimes be identified - even if the machines do not openly mark their origin.<\/p>\n\n\n\n<p>While governments are still arguing over how AI should be regulated, reality is already changing faster than the political debate. Security agencies and technology companies are now openly discussing whether new models should only be released under controlled conditions. The reason is fear that highly advanced systems will not only help researchers, but simultaneously provide cybercriminals with tools that previously existed only within intelligence agencies or specialized groups. But the real problem runs deeper. Today\u2019s internet was built over decades by humans - with mistakes, compromises and security flaws. Those accumulated weaknesses are now colliding with systems capable of analyzing millions of lines of code in seconds. The machines are no longer just learning how to write. They are now learning where existing systems are vulnerable.<\/p>\n\n\n\n<p>For the moment, much still appears controllable. Google managed to stop the attack. The vulnerability was patched. But that is precisely where the real warning lies. If this truly is only the beginning, then the balance of power between defense and attack in the digital world is changing right now. Not sometime ten years from now. Right now.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"kz-ad-root\">\n<style>\n@import url('https:\/\/fonts.googleapis.com\/css2?family=Bebas+Neue&family=Source+Sans+3:ital,wght@0,400;0,700;1,400&display=swap');\n\n.kz-ad-root { margin: 28px 0; }\n\n.kz-ad {\n  font-family: 'Source Sans 3', 'Segoe UI', Arial, sans-serif;\n  background: #ffffff;\n  border: 1px solid #DEDEDE;\n  border-radius: 4px;\n  overflow: hidden;\n  max-width: 100%;\n  box-sizing: border-box;\n}\n\n.kz-top {\n  background: #111111;\n  padding: 12px 18px;\n  display: flex;\n  align-items: center;\n  gap: 10px;\n}\n\n.kz-eyebrow-line {\n  width: 22px;\n  height: 2px;\n  background: #7A1A24;\n  flex-shrink: 0;\n}\n\n.kz-badge {\n  font-size: 13px;\n  font-weight: 700;\n  letter-spacing: 0.14em;\n  text-transform: uppercase;\n  color: #ffffff;\n}\n\n.kz-inner {\n  padding: 22px 18px 20px;\n}\n\n.kz-headline {\n  font-family: 'Bebas Neue', Impact, Arial Narrow, sans-serif;\n  font-size: 2.4rem;\n  font-weight: 400;\n  color: #111111;\n  line-height: 1.1;\n  margin: 0 0 16px 0;\n  letter-spacing: 0.03em;\n}\n\n.kz-headline span {\n  color: #8A8A8A;\n}\n\n.kz-text {\n  font-size: 1.05rem;\n  line-height: 1.75;\n  color: #333333;\n  margin: 0 0 16px 0;\n}\n\n.kz-callout {\n  font-size: 1.05rem;\n  line-height: 1.65;\n  color: #111111;\n  font-weight: 700;\n  border-left: 3px solid #7A1A24;\n  padding: 12px 14px;\n  margin: 0 0 22px 0;\n  background: #F7F7F7;\n  border-radius: 0 2px 2px 0;\n}\n\n.kz-btn {\n  display: flex;\n  align-items: center;\n  justify-content: center;\n  gap: 9px;\n  width: 100%;\n  box-sizing: border-box;\n  padding: 16px 20px;\n  background: #7A1A24;\n  color: #ffffff;\n  font-family: 'Source Sans 3', sans-serif;\n  font-weight: 700;\n  font-size: 1.1rem;\n  text-decoration: none;\n  border-radius: 2px;\n  transition: background 0.18s, transform 0.15s;\n  letter-spacing: 0.03em;\n  text-transform: uppercase;\n  margin-bottom: 16px;\n}\n\n.kz-btn:hover {\n  background: #5C1219;\n  transform: translateY(-1px);\n}\n\n.kz-btn svg { transition: transform 0.18s; }\n.kz-btn:hover svg { transform: translateX(3px); }\n\n.kz-footer {\n  display: flex;\n  align-items: center;\n  justify-content: center;\n  padding-bottom: 2px;\n}\n\n.kz-more {\n  font-size: 1.05rem;\n  color: #444444;\n  text-decoration: none;\n  transition: color 0.15s, border-color 0.15s;\n  font-style: italic;\n  border-bottom: 1px solid #CCCCCC;\n  padding-bottom: 2px;\n}\n\n.kz-more:hover { color: #7A1A24; border-color: #7A1A24; }\n\n@media (min-width: 540px) {\n  .kz-inner { padding: 24px 26px 22px; }\n  .kz-headline { font-size: 2.8rem; }\n\n  .kz-btn {\n    width: auto;\n    display: inline-flex;\n    padding: 15px 36px;\n  }\n\n  .kz-btn-wrap {\n    display: flex;\n    align-items: center;\n    justify-content: space-between;\n    gap: 16px;\n  }\n\n  .kz-footer {\n    justify-content: flex-end;\n  }\n}\n<\/style>\n\n<div class=\"kz-ad\">\n  <div class=\"kz-top\">\n    <div class=\"kz-eyebrow-line\"><\/div>\n    <span class=\"kz-badge\">Independent Journalism \u00b7 Kaizen Blog<\/span>\n  <\/div>\n  <div class=\"kz-inner\">\n\n    <h3 class=\"kz-headline\">We are where,<br>it hurts. <span>wehtut.<\/span><\/h3>\n\n    <p class=\"kz-text\">We do not sit in comfort writing about the world - and we do not stop once the writing ends. Our help goes where it is needed. We are a small team. No investors, no millionaires, no large newsroom behind us. What we have is heart, determination, and the commitment to uncover things that others often overlook. If you want this work to continue, please support the Kaizen Blog.<\/p>\n\n    <div class=\"kz-callout\">Our work depends on those who pay attention - and stand up for making sure it remains possible.<\/div>\n\n    <div class=\"kz-btn-wrap\">\n      <a class=\"kz-btn\" href=\"https:\/\/buy.stripe.com\/bJe5kD0KYggG04A2Pw3VC01\" target=\"_blank\" rel=\"noopener\">\n        Make Kaizen possible\n        <svg width=\"17\" height=\"17\" viewbox=\"0 0 14 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n          <path d=\"M2 7h10M8 3l4 4-4 4\" stroke=\"#fff\" stroke-width=\"1.8\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n        <\/svg>\n      <\/a>\n      <div class=\"kz-footer\">\n        <a class=\"kz-more\" href=\"https:\/\/kaizen-blog.org\/en\/unterstuetzen-sie-unser-arbeit\/\" target=\"_blank\" rel=\"noopener\">About our work \u2192<\/a>\n      <\/div>\n    <\/div>\n\n  <\/div>\n<\/div>\n<\/div>\n\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"kb-news-update-box\" style=\"    max-width: 650px;    margin: 2rem auto;    padding: 1.25rem 1.5rem;    border-radius: 12px;    border: 1px solid rgba(120,120,120,0.4);    background: rgba(15,15,20,0.03);    backdrop-filter: blur(4px);    font-family: system-ui, -apple-system, BlinkMacSystemFont, 'Segoe UI', sans-serif;\">\n  <style>\n    @media (prefers-color-scheme: dark) {\n      .kb-news-update-box {\n        background: rgba(15,15,20,0.9) !important;\n        border-color: rgba(160,160,160,0.4) !important;\n      }\n      .kb-news-update-box h3 {\n        color: #f5f5f5 !important;\n      }\n      .kb-news-update-box p {\n        color: #e0e0e0 !important;\n      }\n      .kb-news-update-box a.kb-news-link {\n        color: #ffb347 !important;\n        border-color: rgba(255,179,71,0.4) !important;\n      }\n      .kb-news-update-box a.kb-news-link:hover {\n        background: rgba(255,179,71,0.12) !important;\n      }\n    }\n  <\/style>\n\n  <h3 style=\"      margin: 0 0 0.5rem 0;      font-size: 1.15rem;      letter-spacing: 0.02em;      text-transform: uppercase;  \">\n    Updates \u2013 Kaizen News Brief\n  <\/h3>\n\n  <p style=\"      margin: 0 0 0.9rem 0;      font-size: 0.95rem;      line-height: 1.5;  \">\n    All current curated daily updates can be found in the Kaizen News Brief. \n  <\/p>\n\n  <!-- Deutscher Button -->\n  <a class=\"kb-news-link\" href=\"https:\/\/kaizen-blog.org\/en\/12-mai-2026-kurznachrichten\/\" style=\"      display: inline-flex;      align-items: center;      gap: 0.4rem;      padding: 0.45rem 0.9rem;      border-radius: 999px;      border: 1px solid rgba(0,0,0,0.12);      font-size: 0.9rem;      text-decoration: none;      color: #004b8d;      transition: background 0.15s ease, transform 0.1s ease, border-color 0.15s ease;      margin-bottom: 0.5rem;      margin-right: 0.4rem;  \">\n    <span style=\"font-weight: 600;\">To the Kaizen News Brief<\/span>\n    <span aria-hidden=\"true\" style=\"font-size: 1.1rem;\">\u2197<\/span>\n  <\/a>\n\n  <!-- Englischer Button -->\n  <a class=\"kb-news-link\" href=\"https:\/\/kaizen-blog.org\/en\/12-mai-2026-kurznachrichten\/\" style=\"      display: inline-flex;      align-items: center;      gap: 0.4rem;      padding: 0.45rem 0.9rem;      border-radius: 999px;      border: 1px solid rgba(0,0,0,0.12);      font-size: 0.9rem;      text-decoration: none;      color: #004b8d;      transition: background 0.15s ease, transform 0.1s ease, border-color 0.15s ease;  \">\n    <span style=\"font-weight: 600;\">In English<\/span>\n    <span aria-hidden=\"true\" style=\"font-size: 1.1rem;\">\u2197<\/span>\n  <\/a>\n\n<\/div>\n\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"gsp_post_data\" \r\n\t            data-post_type=\"post\" \r\n\t            data-cat=\"dark-net,us-business,topstory\" \r\n\t            data-modified=\"120\"\r\n\t            data-created=\"1778559914\"\r\n\t            data-title=\"Die Maschinen suchen jetzt selbst nach den Schwachstellen &#8211; und die erste echte Warnung ist bereits da\" \r\n\t            data-home=\"https:\/\/kaizen-blog.org\/en\/\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Jahrelang klang es wie eine dieser futuristischen Warnungen aus Sicherheitskonferenzen, die man kurz liest und wieder vergisst. Irgendwann w\u00fcrden kriminelle Hacker k\u00fcnstliche Intelligenz nutzen, um eigenst\u00e4ndig Sicherheitsl\u00fccken zu finden, die bislang kein Mensch entdeckt hatte. Irgendwann w\u00fcrden Programme anfangen, selbst nach den Schwachstellen des Internets zu suchen. Genau dieser Punkt scheint jetzt erreicht zu sein. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":36130,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[23,47,7],"tags":[],"class_list":["post-36129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dark-net","category-us-business","category-topstory"],"featured_image_src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1","author_info":{"display_name":"Rainer Hofmann","author_link":"https:\/\/kaizen-blog.org\/en\/author\/admin\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die Maschinen suchen jetzt selbst nach den Schwachstellen - und die erste echte Warnung ist bereits da - The Kaizen Blog<\/title>\n<meta name=\"description\" content=\"Jahrelang klang es wie eine dieser futuristischen Warnungen aus Sicherheitskonferenzen, die man kurz liest und wieder vergisst. Irgendwann w\u00fcrden kriminelle Hacker k\u00fcnstliche Intelligenz nutzen, um eigenst\u00e4ndig Sicherheitsl\u00fccken zu finden, die bislang kein Mensch entdeckt hatte.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kaizen-blog.org\/en\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die Maschinen suchen jetzt selbst nach den Schwachstellen - und die erste echte Warnung ist bereits da\" \/>\n<meta property=\"og:description\" content=\"Jahrelang klang es wie eine dieser futuristischen Warnungen aus Sicherheitskonferenzen, die man kurz liest und wieder vergisst. Irgendwann w\u00fcrden kriminelle Hacker k\u00fcnstliche Intelligenz nutzen, um eigenst\u00e4ndig Sicherheitsl\u00fccken zu finden, die bislang kein Mensch entdeckt hatte.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kaizen-blog.org\/en\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/\" \/>\n<meta property=\"og:site_name\" content=\"The Kaizen Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/rainer.hofmann.2025\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-12T03:25:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-12T03:25:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"905\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Rainer Hofmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rainer Hofmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/\"},\"author\":{\"name\":\"Rainer Hofmann\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#\\\/schema\\\/person\\\/7d3fc7346e2501a389ea3daa48b99ad0\"},\"headline\":\"Die Maschinen suchen jetzt selbst nach den Schwachstellen &#8211; und die erste echte Warnung ist bereits da\",\"datePublished\":\"2026-05-12T03:25:14+00:00\",\"dateModified\":\"2026-05-12T03:25:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/\"},\"wordCount\":825,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1\",\"articleSection\":[\"Dark Files\",\"Social &amp; Politics\",\"Topstory\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/\",\"url\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/\",\"name\":\"Die Maschinen suchen jetzt selbst nach den Schwachstellen - und die erste echte Warnung ist bereits da - The Kaizen Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1\",\"datePublished\":\"2026-05-12T03:25:14+00:00\",\"dateModified\":\"2026-05-12T03:25:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#\\\/schema\\\/person\\\/7d3fc7346e2501a389ea3daa48b99ad0\"},\"description\":\"Jahrelang klang es wie eine dieser futuristischen Warnungen aus Sicherheitskonferenzen, die man kurz liest und wieder vergisst. Irgendwann w\u00fcrden kriminelle Hacker k\u00fcnstliche Intelligenz nutzen, um eigenst\u00e4ndig Sicherheitsl\u00fccken zu finden, die bislang kein Mensch entdeckt hatte.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1\",\"width\":905,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/kaizen-blog.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die Maschinen suchen jetzt selbst nach den Schwachstellen &#8211; und die erste echte Warnung ist bereits da\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#website\",\"url\":\"https:\\\/\\\/kaizen-blog.org\\\/\",\"name\":\"The Kaizen Blog\",\"description\":\"Investigativer Journalismus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kaizen-blog.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#\\\/schema\\\/person\\\/7d3fc7346e2501a389ea3daa48b99ad0\",\"name\":\"Rainer Hofmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"\\\/\\\/www.gravatar.com\\\/avatar\\\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials\",\"url\":\"\\\/\\\/www.gravatar.com\\\/avatar\\\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials\",\"contentUrl\":\"\\\/\\\/www.gravatar.com\\\/avatar\\\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials\",\"caption\":\"Rainer Hofmann\"},\"sameAs\":[\"https:\\\/\\\/kaizen-blog.org\"],\"url\":\"https:\\\/\\\/kaizen-blog.org\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Die Maschinen suchen jetzt selbst nach den Schwachstellen - und die erste echte Warnung ist bereits da - The Kaizen Blog","description":"Jahrelang klang es wie eine dieser futuristischen Warnungen aus Sicherheitskonferenzen, die man kurz liest und wieder vergisst. Irgendwann w\u00fcrden kriminelle Hacker k\u00fcnstliche Intelligenz nutzen, um eigenst\u00e4ndig Sicherheitsl\u00fccken zu finden, die bislang kein Mensch entdeckt hatte.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kaizen-blog.org\/en\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/","og_locale":"en_US","og_type":"article","og_title":"Die Maschinen suchen jetzt selbst nach den Schwachstellen - und die erste echte Warnung ist bereits da","og_description":"Jahrelang klang es wie eine dieser futuristischen Warnungen aus Sicherheitskonferenzen, die man kurz liest und wieder vergisst. Irgendwann w\u00fcrden kriminelle Hacker k\u00fcnstliche Intelligenz nutzen, um eigenst\u00e4ndig Sicherheitsl\u00fccken zu finden, die bislang kein Mensch entdeckt hatte.","og_url":"https:\/\/kaizen-blog.org\/en\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/","og_site_name":"The Kaizen Blog","article_publisher":"https:\/\/www.facebook.com\/rainer.hofmann.2025\/","article_published_time":"2026-05-12T03:25:14+00:00","article_modified_time":"2026-05-12T03:25:18+00:00","og_image":[{"width":905,"height":500,"url":"https:\/\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp","type":"image\/webp"}],"author":"Rainer Hofmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rainer Hofmann","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#article","isPartOf":{"@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/"},"author":{"name":"Rainer Hofmann","@id":"https:\/\/kaizen-blog.org\/#\/schema\/person\/7d3fc7346e2501a389ea3daa48b99ad0"},"headline":"Die Maschinen suchen jetzt selbst nach den Schwachstellen &#8211; und die erste echte Warnung ist bereits da","datePublished":"2026-05-12T03:25:14+00:00","dateModified":"2026-05-12T03:25:18+00:00","mainEntityOfPage":{"@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/"},"wordCount":825,"commentCount":0,"image":{"@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1","articleSection":["Dark Files","Social &amp; Politics","Topstory"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/","url":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/","name":"Die Maschinen suchen jetzt selbst nach den Schwachstellen - und die erste echte Warnung ist bereits da - The Kaizen Blog","isPartOf":{"@id":"https:\/\/kaizen-blog.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#primaryimage"},"image":{"@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1","datePublished":"2026-05-12T03:25:14+00:00","dateModified":"2026-05-12T03:25:18+00:00","author":{"@id":"https:\/\/kaizen-blog.org\/#\/schema\/person\/7d3fc7346e2501a389ea3daa48b99ad0"},"description":"Jahrelang klang es wie eine dieser futuristischen Warnungen aus Sicherheitskonferenzen, die man kurz liest und wieder vergisst. Irgendwann w\u00fcrden kriminelle Hacker k\u00fcnstliche Intelligenz nutzen, um eigenst\u00e4ndig Sicherheitsl\u00fccken zu finden, die bislang kein Mensch entdeckt hatte.","breadcrumb":{"@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#primaryimage","url":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1","contentUrl":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1","width":905,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/kaizen-blog.org\/die-maschinen-suchen-jetzt-selbst-nach-den-schwachstellen-und-die-erste-echte-warnung-ist-bereits-da\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/kaizen-blog.org\/"},{"@type":"ListItem","position":2,"name":"Die Maschinen suchen jetzt selbst nach den Schwachstellen &#8211; und die erste echte Warnung ist bereits da"}]},{"@type":"WebSite","@id":"https:\/\/kaizen-blog.org\/#website","url":"https:\/\/kaizen-blog.org\/","name":"The Kaizen Blog","description":"Investigative Journalism","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kaizen-blog.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kaizen-blog.org\/#\/schema\/person\/7d3fc7346e2501a389ea3daa48b99ad0","name":"Rainer Hofmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/\/www.gravatar.com\/avatar\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials","url":"\/\/www.gravatar.com\/avatar\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials","contentUrl":"\/\/www.gravatar.com\/avatar\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials","caption":"Rainer Hofmann"},"sameAs":["https:\/\/kaizen-blog.org"],"url":"https:\/\/kaizen-blog.org\/en\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/05\/batch_kaizennewsday-2026-05-12T052100.761.webp?fit=905%2C500&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":9660,"url":"https:\/\/kaizen-blog.org\/en\/die-sharepoint-luecke-ein-weckruf-fuer-it-sicherheit-in-zeiten-vernetzter-systeme\/","url_meta":{"origin":36129,"position":0},"title":"The SharePoint Vulnerability \u2013 A Wake-Up Call for Cybersecurity in an Interconnected World","author":"Alan Gallardo","date":"July 21, 2025","format":false,"excerpt":"Es ist ein Angriff, der einmal mehr zeigt, wie verwundbar selbst die etabliertesten IT-Infrastrukturen sein k\u00f6nnen: Microsoft hat am Wochenende einen Notfall-Patch f\u00fcr eine gravierende Sicherheitsl\u00fccke in seiner weit verbreiteten SharePoint-Software ver\u00f6ffentlicht. Die L\u00fccke, die von Hackern bereits aktiv ausgenutzt wird, betrifft nicht nur Unternehmen weltweit, sondern auch mehrere US-Beh\u00f6rden.\u2026","rel":"","context":"In &quot;Dark Files&quot;","block_context":{"text":"Dark Files","link":"https:\/\/kaizen-blog.org\/en\/category\/investigativ\/dark-net\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/Kopie-von-Kopie-von-Kopie-von-Social-Kaizen26.webp?fit=900%2C508&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/Kopie-von-Kopie-von-Kopie-von-Social-Kaizen26.webp?fit=900%2C508&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/Kopie-von-Kopie-von-Kopie-von-Social-Kaizen26.webp?fit=900%2C508&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/Kopie-von-Kopie-von-Kopie-von-Social-Kaizen26.webp?fit=900%2C508&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":28018,"url":"https:\/\/kaizen-blog.org\/en\/die-stille-erfassung-wie-ice-geheime-listen-gegen-demonstrierende-und-journalisten-aufbaut\/","url_meta":{"origin":36129,"position":1},"title":"The Silent Listing \u2013 How ICE Builds Secret Lists Targeting Protesters and Journalists","author":"Rainer Hofmann","date":"February 3, 2026","format":false,"excerpt":"Es beginnt in diesem Fall nicht mit einem Gesetz und nicht mit einem \u00f6ffentlichen Beschluss, sondern mit einem Satz, der auf der Stra\u00dfe f\u00e4llt. Ein maskierter Bundesbeamter verspottet einen Demonstrierenden und erkl\u00e4rt ihm, er stehe nun in einer Datenbank, gelte als inl\u00e4ndischer Terrorist. Offiziell weist das Heimatschutzministerium jede Existenz solcher\u2026","rel":"","context":"In &quot;Topstory&quot;","block_context":{"text":"Topstory","link":"https:\/\/kaizen-blog.org\/en\/category\/topstory\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/02\/batch_kaizennewsday-2026-02-03T054846.256-1.webp?fit=905%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/02\/batch_kaizennewsday-2026-02-03T054846.256-1.webp?fit=905%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/02\/batch_kaizennewsday-2026-02-03T054846.256-1.webp?fit=905%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/02\/batch_kaizennewsday-2026-02-03T054846.256-1.webp?fit=905%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":16069,"url":"https:\/\/kaizen-blog.org\/en\/kkk-kontrolle-konfession-katastrophe-wenn-saeuberungs-apps-nutzer-preisgeben\/","url_meta":{"origin":36129,"position":2},"title":"KKK \u2014 Keepers, Konfession, Katastrophe - When Purge Apps Turn Users Into Targets","author":"Rainer Hofmann","date":"September 24, 2025","format":false,"excerpt":"Es begann mit der Moral, nun endet es mit Leaks und L\u00f6schbefehlen. Zwei Ph\u00e4nomene zeigen gerade, wie sich konservative Digitalkultur in Richtung Kontrolle und Denunziation ver\u00e4ndert: die moralische Selbst\u00fcberwachung in Form von Apps wie Covenant Eyes und die instrumentalisierte Zivil-Technologie in Form von \u201eCancel the Hate\u201c. Auf dem Papier versprechen\u2026","rel":"","context":"In &quot;Dark Files&quot;","block_context":{"text":"Dark Files","link":"https:\/\/kaizen-blog.org\/en\/category\/investigativ\/dark-net\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/09\/kaizen_22Dein-Abschnittstext35.webp?fit=905%2C505&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/09\/kaizen_22Dein-Abschnittstext35.webp?fit=905%2C505&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/09\/kaizen_22Dein-Abschnittstext35.webp?fit=905%2C505&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/09\/kaizen_22Dein-Abschnittstext35.webp?fit=905%2C505&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":3585,"url":"https:\/\/kaizen-blog.org\/en\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/","url_meta":{"origin":36129,"position":3},"title":"A State in Your Pocket \u2013 How Smartphones Became the Achilles\u2019 Heel of Western Security","author":"Rainer Hofmann","date":"June 8, 2025","format":false,"excerpt":"Es beginnt mit einem Absturz. Kein lauter, kein spektakul\u00e4rer \u2013 sondern ein stiller, beinahe unscheinbarer Fehler in einem System, das l\u00e4ngst kein technisches Spielzeug mehr ist, sondern ein geopolitischer Resonanzk\u00f6rper. Als Cybersicherheits-Analysten der Firma iVerify Ende 2024 vermehrt unerkl\u00e4rliche Softwareabst\u00fcrze auf den Smartphones westlicher Regierungsmitarbeiter registrieren, ahnt noch niemand, wie\u2026","rel":"","context":"In &quot;Dark Files&quot;","block_context":{"text":"Dark Files","link":"https:\/\/kaizen-blog.org\/en\/category\/investigativ\/dark-net\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2220,"url":"https:\/\/kaizen-blog.org\/en\/trumps-eiserner-apparat-wie-die-ice-zur-abschiebungsmaschine-umgebaut-wird\/","url_meta":{"origin":36129,"position":4},"title":"Trump\u2019s Iron Apparatus \u2013 How ICE Is Being Transformed into a Deportation Machine","author":"Rainer Hofmann","date":"May 29, 2025","format":false,"excerpt":"Es beginnt mit einer Personalentscheidung, doch sie steht f\u00fcr weit mehr als blo\u00dfen Verwaltungsumbau. Die US-Einwanderungs- und Zollbeh\u00f6rde (ICE), Herzst\u00fcck von Donald Trumps massiver Abschiebungspolitik, wird tiefgreifend umstrukturiert \u2013 und die neuen K\u00f6pfe sprechen eine deutliche Sprache. Wer k\u00fcnftig diesen Apparat steuert, soll nicht verwalten, sondern vollstrecken. Nicht bremsen, sondern\u2026","rel":"","context":"In &quot;Deportations Under Trump&quot;","block_context":{"text":"Deportations Under Trump","link":"https:\/\/kaizen-blog.org\/en\/category\/deportations-under-trump\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/05\/ICE-Trumpp-deportation.webp?fit=1080%2C609&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/05\/ICE-Trumpp-deportation.webp?fit=1080%2C609&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/05\/ICE-Trumpp-deportation.webp?fit=1080%2C609&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/05\/ICE-Trumpp-deportation.webp?fit=1080%2C609&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/05\/ICE-Trumpp-deportation.webp?fit=1080%2C609&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7145,"url":"https:\/\/kaizen-blog.org\/en\/abschiebungen-angst-und-ablehnung-trumps-migrationspolitik-treibt-umfragewerte-in-den-keller\/","url_meta":{"origin":36129,"position":5},"title":"Deportations, Fear, and Rejection - Trump\u2019s Immigration Policy Drives Approval Ratings to New Lows","author":"Rainer Hofmann","date":"July 3, 2025","format":false,"excerpt":"Washington \u2013 Es war ein kalkulierter Kraftakt der Trump-Regierung, doch er droht zum politischen Bumerang zu werden: Seit Wochen f\u00fchrt die US-Einwanderungsbeh\u00f6rde ICE aggressive Massenrazzien in amerikanischen Gro\u00dfst\u00e4dten durch. Tausende Menschen wurden verhaftet, abgeschoben oder in Haftzentren gebracht \u2013 oft ohne Vorwarnung, h\u00e4ufig ohne gerichtlichen Beschluss. Nun zeigen die neuesten\u2026","rel":"","context":"In &quot;Spotlight&quot;","block_context":{"text":"Spotlight","link":"https:\/\/kaizen-blog.org\/en\/category\/spotlight\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/pollice.webp?fit=850%2C508&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/pollice.webp?fit=850%2C508&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/pollice.webp?fit=850%2C508&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/07\/pollice.webp?fit=850%2C508&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/posts\/36129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/comments?post=36129"}],"version-history":[{"count":0,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/posts\/36129\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/media\/36130"}],"wp:attachment":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/media?parent=36129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/categories?post=36129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/tags?post=36129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}