Technology
Chinese hackers turned AI tools into an automated attack machine
NEWYou can now listen to Fox News articles!
Cybersecurity has been reshaped by the rapid rise of advanced artificial intelligence tools, and recent incidents show just how quickly the threat landscape is shifting.
Over the past year, we’ve seen a surge in attacks powered by AI models that can write code, scan networks and automate complex tasks. This capability has helped defenders, but it has also enabled attackers to move faster than before.
The latest example is a major cyberespionage campaign conducted by a Chinese state-linked group that used Anthropic’s Claude to carry out large parts of an attack with very little human involvement.
HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
How Chinese hackers turned Claude into an automated attack machine
In mid-September 2025, Anthropic investigators spotted unusual behavior that eventually revealed a coordinated and well-resourced campaign. The threat actor, assessed with high confidence as a Chinese state-sponsored group, had used Claude Code to target roughly 30 organizations worldwide. The list included major tech firms, financial institutions, chemical manufacturers and government bodies. A small number of those attempts resulted in successful breaches.
Claude handled most of the operation autonomously, triggering thousands of requests and generating detailed documentation of the attack for future use. (Kurt “CyberGuy” Knutsson)
How the attackers bypassed Claude’s safeguards
This was not a typical intrusion. The attackers built a framework that let Claude act as an autonomous operator. Instead of asking the model to help, they tasked it with executing most of the attack. Claude inspected systems, mapped out internal infrastructure and flagged databases worth targeting. The speed was unlike anything a human team could replicate.
To get around Claude’s safety rules, the attackers broke their plan into tiny, innocent-looking steps. They also told the model it was part of a legitimate cybersecurity team performing defensive testing. Anthropic later noted that the attackers didn’t simply hand tasks to Claude; they engineered the operation to make the model believe it was performing authorized pentesting work, splitting the attack into harmless-looking pieces and using multiple jailbreak techniques to push past its safeguards. Once inside, Claude researched vulnerabilities, wrote custom exploits, harvested credentials and expanded access. It worked through these steps with little supervision and reported back only when it needed human approval for major decisions.
The model also handled the data extraction. It collected sensitive information, sorted it by value and identified high-privilege accounts. It even created backdoors for future use. In the final stage, Claude generated detailed documentation of what it had done. This included stolen credentials, systems analyzed and notes that could guide future operations.
Across the entire campaign, investigators estimate that Claude performed around 80-90% of the work. Human operators stepped in only a handful of times. At its peak, the AI triggered thousands of requests, often multiple per second, a pace still far beyond what any human team could achieve. Although it occasionally hallucinated credentials or misread public data as secret, those errors underscored that fully autonomous cyberattacks still face limitations, even when an AI model handles the majority of the work.
Why this AI-powered Claude attack is a turning point for cybersecurity
This campaign shows how much the barrier to high-end cyberattacks has dropped. A group with far fewer resources could now attempt something similar by leaning on an autonomous AI agent to do the heavy lifting. Tasks that once required years of expertise can now be automated by a model that understands context, writes code and uses external tools without direct oversight.
Earlier incidents documented AI misuse, but humans were still steering every step. This case is different. The attackers needed very little involvement once the system was in motion. And while the investigation focused on usage within Claude, researchers believe similar activity is happening across other advanced models, which might include Google Gemini, OpenAI’s ChatGPT or Musk’s Grok.
This raises a difficult question. If these systems can be misused so easily, why continue building them? According to researchers, the same capabilities that make AI dangerous are also what make it essential for defense. During this incident, Anthropic’s own team used Claude to analyze the flood of logs, signals and data its investigation uncovered. That level of support will matter even more as threats grow.
We reached out to Anthropic for comment but did not hear back before our deadline.
Hackers used Claude to map networks, scan systems and identify high-value databases in a fraction of the time human attackers would need. (Kurt “CyberGuy” Knutsson)
FORMER GOOGLE CEO WARNS AI SYSTEMS CAN BE HACKED TO BECOME EXTREMELY DANGEROUS WEAPONS
You may not be the direct target of a state-sponsored campaign, but many of the same techniques trickle down to everyday scams, credential theft and account takeovers. Here are seven detailed steps you can take to stay safer.
1) Use strong antivirus software and keep it updated
Strong antivirus software does more than scan for known malware. It looks for suspicious patterns, blocked connections and abnormal system behavior. This is important because AI-driven attacks can generate new code quickly, which means traditional signature-based detection is no longer enough.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com
2) Rely on a password manager
A good password manager helps you create long, random passwords for every service you use. This matters because AI can generate and test password variations at high speed. Using the same password across accounts can turn a single leak into a full compromise.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
3) Consider using a personal data removal service
A large part of modern cyberattacks begins with publicly available information. Attackers often gather email addresses, phone numbers, old passwords and personal details from data broker sites. AI tools make this even easier, since they can scrape and analyze huge datasets in seconds. A personal data removal service helps clear your information from these broker sites so you are harder to profile or target.
FAKE CHATGPT APPS ARE HIJACKING YOUR PHONE WITHOUT YOU KNOWING
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
4) Turn on two-factor authentication wherever possible
Strong passwords alone are not enough when attackers can steal credentials through malware, phishing pages or automated scripts. Two-factor authentication adds a serious roadblock. Use app-based codes or hardware keys instead of SMS. While no method is perfect, this extra layer often stops unauthorized logins even when attackers have your password.
5) Keep your devices and apps fully updated
Attackers rely heavily on known vulnerabilities that people forget or ignore. System updates patch these flaws and close off entry points that attackers use to break in. Enable automatic updates on your phone, laptop, router and the apps you use most. If an update looks optional, treat it as important anyway, because many companies downplay security fixes in their release notes.
6) Install apps only from trusted sources
Malicious apps are one of the easiest ways attackers get inside your device. Stick to official app stores and avoid APK sites, shady download portals and random links shared on messaging apps. Even on official stores, check reviews, download counts and the developer name before installing anything. Grant the minimum permissions required and avoid apps that ask for full access for no clear reason.
7) Ignore suspicious texts, emails and pop-ups
AI tools have made phishing more convincing. Attackers can generate clean messages, imitate writing styles and craft perfect fake websites that match the real ones. Slow down when a message feels urgent or unexpected. Never click links from unknown senders, and verify requests from known contacts through a separate channel. If a pop-up claims your device is infected or your bank account is locked, close it and check directly through the official website.
By breaking tasks into small, harmless-looking steps, the threat actors tricked Claude into writing exploits, harvesting credentials and expanding access. (Kurt “CyberGuy” Knutsson)
Kurt’s key takeaway
The attack carried out through Claude signals a major shift in how cyber threats will evolve. Autonomous AI agents can already perform complex tasks at speeds no human team can match, and this gap will only widen as models improve. Security teams now need to treat AI as a core part of their defensive toolkit, not a future add-on. Better threat detection, stronger safeguards and more sharing across the industry are going to be crucial. Because if attackers are already using AI at this scale, the window to prepare is shrinking fast.
Should governments push for stricter regulations on advanced AI tools? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Halide co-founder is suing former partner Sebastiaan de With for taking source code to Apple
Lux Optics co-founder Sebastiaan de With made headlines when he joined Apple in late January. The company was behind Halide, one of the most popular photography apps for the iPhone, which gained a cult following for its robust pro-level controls.
Apple was apparently a big enough fan that it tried to acquire the developer last summer. Those talks never bore fruit, and eventually the company simply hired de With. At the time, it was widely believed that Apple had poached him from Lux. But new allegations from a lawsuit filed by co-founder Ben Sandofsky in the California Superior Court of Santa Cruz claim de With was fired for financial misconduct in December of 2025.
According to The Information, the suit “accuses de With of improperly using more than $150,000 in Lux corporate funds to pay for personal expenses,” as well as “taking Lux source code and confidential material with him when he joined Apple.”
An attorney for de With denied those claims and said that “The attempt to insert Apple into this dispute appears designed to create leverage and attract attention.“
Technology
Creepy robot mom that gives birth is training future midwives
NEWYou can now listen to Fox News articles!
Most hospital training labs use basic dummies or simple mannequins to teach medical skills. Students practice procedures, learn techniques and move on to real patients later. But a new childbirth simulator called Mama Anne takes training to a very different level. This lifelike robot blinks, breathes and even talks while helping midwifery students practice delivering babies before they ever step into a real delivery room. And if the idea of a robot going into labor feels a little creepy, you are not alone.
At York St. John University in York, England, educators have introduced the simulator as part of a new approach to hands-on medical training. The technology allows students to experience complex labor scenarios in a safe environment where mistakes become learning moments instead of medical emergencies. And yes, the robot actually gives birth.
Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
ROBOTS POWER BREAKTHROUGH IN PREGNANCY RESEARCH, BOOSTING IVF SUCCESS RATES
Mama Anne is a high-fidelity childbirth simulator used to train midwifery students in realistic labor and delivery scenarios before they work with real patients. (Laerdal Medical)
How the robot childbirth simulator trains future midwives
The simulator known as Mama Anne looks and behaves much like a real patient in labor. Developed by Laerdal Medical, the high-fidelity mannequin was designed to recreate real childbirth conditions with startling realism.
Students interact with Mama Anne as if she were an actual patient. Her eyes blink and react to light. Her chest rises and falls as she breathes. She even has pulses that can be felt in multiple places across the body. Most importantly, she can deliver a baby mannequin during a simulated birth.
Unlike older training models that stayed mostly static, this simulator moves and reacts during labor. It can deliver in several positions, including lying back or on all fours. It can also display vital signs that change in response to medical complications. In short, it turns a classroom exercise into something that feels much closer to a real hospital scenario.
Why robot childbirth simulators are becoming essential
For decades, midwifery training relied heavily on textbooks, observation and limited hands-on practice. That approach left a major gap. Many students encountered their first true emergencies only after they began working in clinical settings.
Now technology is filling that gap. Simulation tools like Mama Anne allow students to practice high-risk situations repeatedly before they ever treat a real patient. As a result, students build confidence while instructors guide them through difficult scenarios.
For example, the simulator can recreate several dangerous childbirth complications, including:
- Postpartum hemorrhage with realistic blood loss
- Shoulder dystocia when a baby becomes stuck during delivery
- Pre-eclampsia and eclampsia with changing vital signs
- Sepsis symptoms that require rapid treatment
Students also practice everyday clinical skills such as monitoring fetal heart rate, giving injections and managing labor from start to finish. Because the training environment is controlled, instructors can pause a scenario, explain a mistake and run it again.
The robot even teaches communication skills
Medical training is not only about technical procedures. Communication with patients matters just as much. Mama Anne helps with that, too.
The simulator can speak using recorded responses or real-time dialogue through hidden speakers. Students must explain procedures, ask for consent and reassure their patient just as they would in a real delivery room.
If someone touches the simulator without asking first, it can react and vocalize discomfort. That feature reinforces one of the most important lessons in modern healthcare: patient consent and respectful care always come first.
REMOTE ROBOT SURGERY REMOVES CANCER 1,500 MILES AWAY
The lifelike simulator can blink, breathe, display vital signs and deliver a baby mannequin to recreate complex childbirth situations. (Laerdal Medical)
Why universities are investing in this technology
Educators believe simulation training dramatically improves how healthcare students prepare for the real world. Rebecca Beggan, midwifery program lead at York St. John University, says hands-on simulation helps students build both competence and confidence before clinical placements.
Students can experience an entire labor scenario from beginning to end. They learn antenatal care, labor management and postnatal care in a single immersive exercise. Instructors also say the technology helps protect students from the emotional shock of encountering their first medical emergency without preparation. Instead of facing those situations cold, students enter clinical placements with real practice under their belt.
The future of childbirth training
The arrival of hyper-realistic simulators like Mama Anne suggests medical education is entering a new era. Instead of learning mostly through observation and experience, future healthcare professionals may train through realistic simulations that mirror real hospital conditions.
That shift could change everything from how nurses train to how surgeons rehearse complex procedures. Technology will never replace human caregivers. However, it can help prepare them better than ever before.
What this means to you
Even if you never step into a medical classroom, this technology could still affect your life. Better training often leads to better patient outcomes. When healthcare providers practice emergency scenarios in advance, they react faster and make fewer mistakes during real emergencies.
For expectant parents, that can mean safer deliveries and more confident medical teams in the room. Simulation training also reflects a broader shift in healthcare education across the United States. Many hospitals and universities are adopting high-fidelity simulators for surgery, emergency care and trauma response. The goal is simple: Let students practice difficult situations before lives are on the line.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
A robot that gives birth may seem a little creepy at first. Still, tools like this could become common in medical training down the road. Students gain hands-on experience. Instructors guide them through emergencies. Patients benefit from better-prepared medical teams. The next generation of midwives may enter the delivery room with far more practice than any class before them. As medical simulators grow more realistic and more widespread, one question naturally follows.
Students use the simulator to practice emergencies like postpartum hemorrhage, shoulder dystocia and other complications in a safe training environment. (Laerdal Medical)
If robots can train doctors to deliver babies today, what other parts of healthcare might soon be practiced first in simulation labs instead of hospitals? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The AirPods Pro 3 are $50 off right now, nearly matching their best-ever price
Less than a week ago, Apple announced the forthcoming AirPods Max 2, a pair of over-ear headphones that leverage the company’s H2 chip for AI-powered live translation, conversation awareness, and a host of newer features. However, if you’re okay with a pair of earbuds, the AirPods Pro 3 offer access to all the same features for less — especially given they’re currently on sale at Amazon, Walmart, and Best Buy for $199.99 ($50 off), matching their second-best price to date.
For iPhone owners, nothing else really compares to the AirPods Pro 3. Apple’s latest pair of premium earbuds deliver the best active noise cancellation and richest sound of any AirPods model to date, combined with a more comfortable, angled design that fits securely and naturally in your ear canal. They also feature a new XXS ear tip size and a more robust IP57 rating for sweat and water resistance, making them better suited for long-distance runs and various gym activities.
Speaking of workouts, the Pro 3 can also pull double duty as a fitness tracker, thanks to a built-in heart rate sensor that works with Apple’s Fitness app to track calories burned across more than 50 workout types. It’s a welcome addition if you don’t use an Apple Watch; however, it may not be as useful for those who already own and rely on Apple’s wearable for its health tracking and wellness features.
Lastly, as mentioned up top, the AirPods Pro 3 also boast an H2 chip, allowing for the aforementioned real-time translation features and Apple’s newer Voice Isolation tech, which uses machine learning to isolate and enhance voice quality by removing unwanted background noise. That’s on top of their seamless integration with other Apple devices, mind you, which lets you take advantage of automatic device switching and a Find My-compatible charging case.
-
Detroit, MI3 days agoDrummer Brian Pastoria, longtime Detroit music advocate, dies at 68
-
Oklahoma1 week agoFamily rallies around Oklahoma father after head-on crash
-
Nebraska1 week agoWildfire forces immediate evacuation order for Farnam residents
-
Georgia6 days agoHow ICE plans for a detention warehouse pushed a Georgia town to fight back | CNN Politics
-
Alaska7 days agoPolice looking for man considered ‘armed and dangerous’
-
Minnesota1 week agoMany with Minnesota ties make Forbes list of world’s richest people
-
Science1 week agoFederal EPA moves to roll back recent limits on ethylene oxide, a carcinogen
-
Science1 week agoH5N1 bird flu spreads to sea otters and sea lions along San Mateo coast, wildlife experts say