Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why this midrange Lenovo laptop is what I suggest to most people

    August 30, 2025

    Tamperedchef infostealer distributed through fraud PDF editor

    August 30, 2025

    Fachkräftemangel Bedroht Cybrasherhit | CSO online

    August 30, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»AI/ML»‘Vibe-Haiking’ is now a top AI threat
    AI/ML

    ‘Vibe-Haiking’ is now a top AI threat

    PineapplesUpdateBy PineapplesUpdateAugust 27, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    ‘Vibe-Haiking’ is now a top AI threat
    Share
    Facebook Twitter LinkedIn Pinterest Email

    “Agent AI system is being made weapons.”

    It is one of the first rows of anthropic New threat intelligence reportFrom today, which Details of wide range of cases in which cloud – And possibly many other major AI agents and chatbots – are being misused.

    First of all: “Vibe-hacking.” A sophisticated cybercrime ring that anthropic says that he recently used cloud code to extract data from at least 17 separate organizations around the world, AI coding agent of Anthropic. The hacked parties included health organizations, emergency services, religious institutions and even government institutions.

    “If you are a sophisticated actor, what otherwise it would be necessary that perhaps a team of sophisticated actors, such as a vib-hacking case, to conduct-now, can conduct with the help of a single person agent system,” Jacob Kalen, Head of anthropic team, stated, said, stated. Ruckus in an interview. He said that in this case, Cloud was “executing Operation and-to-end”.

    Anthropic wrote in the report that in such cases, AI “acts as both a technical advisor and active operator, which enables attacks that will be more difficult and time -taking for individual actors to execute manually.” For example, Cloud was used especially to write “psychologically targeted forcible recovery”. The cyber criminal then discovered that data – including healthcare data, financial information, government credentials, and much more – will be worth on the dark web and the ransom demand is more than $ 500,000, per anthropic.

    “This is the most sophisticated use of agents I have seen … for cyber crime,” Klein said.

    In a study of another case, Cloud helped North Korean IT workers to work in Fortune 500 companies in the US to fund the country’s weapon program. Usually, in such cases, North Korea tries to take advantage of those who have gone to college, or there is some ability to communicate in English per clain, per clain – but he said that in this case, in this case, there is little obstruction to people in North Korea to pass technical interviews in large technology companies and then keep their jobs.

    With the help of Cloud, Klein said, “We are looking at people who do not know how to write codes, do not know how to communicate professionally, know very little about English language or culture, who are just asking Cloud to do everything … and then once they are working, they are actually working with Cloud.”

    Another case study included a romance scam. A telegram bot with over 10,000 monthly users advertised clouds as a “high EQ model” to help generate emotionally intelligent messages for scams. This enabled non-indigenous English speakers to write inspiring, compatible messages to gain confidence of victims in the United States, Japan and Korea, and asked for money from them. An example in the report showed a user uploading the image of a man in a tie and asked how to praise him.

    In the report, the anthropic itself accepts that although the company has “developed sophisticated safety and safety measures” to prevent its misuse of AI, although the measures “are generally effective,” Bad actors still manage to find ways around them. Anthropic says AI has reduced obstacles for sophisticated cyber crime and uses technology to profile victims, to automate their practices, to automate their practices, make false identity, analyze stolen data, steal credit card information, and do more.

    The report in each case study increases the increasing amount of evidence of AI companies, as they can, often try to try to keep with the social risks associated with the technology they are making and putting in the world. “While being specific to the cloud, the case studies below reflect the frequent patterns of behavior in the AI ​​model,” the report said.

    Anthropic stated that for the study of every case, it banned the concerned accounts, constructed new classifier or other detection measures, and shared information with appropriate government agencies, such as intelligence agencies or law enforcement, Klein confirmed. He also said that the matter that his team studied is part of a comprehensive change in AI risk.

    Klein said, “This change is happening, where the AI ​​systems are not just a chatbot because they can take several steps now,” they say, “they are really able to conduct action or activity as we are looking here.”

    0 Information

    Follow subjects and writers To see more in your personal homepage feed from this story and get email updates.

    • Hayden Field

      Hayden Field

      Hayden Field

      This author’s post will be added to your daily email digest and your homepage feed.

      See everyone Hayden Field

    • Aye

      Posts of this subject will be added to your daily email digest and your homepage feed.

      see all Aye

    • Secrecy

      Posts of this subject will be added to your daily email digest and your homepage feed.

      see all Secrecy

    • Security

      Posts of this subject will be added to your daily email digest and your homepage feed.

      see all Security

    • Technology

      Posts of this subject will be added to your daily email digest and your homepage feed.

      see all Technology

    threat Top VibeHaiking
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThis franchise will give you up to $ 100,000 to start a business
    Next Article 5 And methods to share files on Linux which every supporter must know
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    Why this midrange Lenovo laptop is what I suggest to most people

    August 30, 2025
    AI/ML

    You can save up to $ 700 at my favorite bluety power stations for Labor Day

    August 30, 2025
    AI/ML

    Vintage Electronics: Secure with a retarded tester

    August 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Why this midrange Lenovo laptop is what I suggest to most people

    August 30, 2025

    Tamperedchef infostealer distributed through fraud PDF editor

    August 30, 2025

    Fachkräftemangel Bedroht Cybrasherhit | CSO online

    August 30, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.