{"id":57007,"date":"2024-09-03T00:00:00","date_gmt":"2024-09-03T00:00:00","guid":{"rendered":"urn:uuid:267e2407-3d0d-a023-fdf2-11928e54f06b"},"modified":"2024-09-03T00:00:00","modified_gmt":"2024-09-03T00:00:00","slug":"how-ai-goes-rogue","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/","title":{"rendered":"How AI Goes Rogue"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/rogue-ai-part-2:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/rogue-ai-part-2.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The term \u201cRogue AI\u201d refers to artificial intelligence systems that act against the interests of their creators, users, or humanity in general. Rogue AI is a new risk that happens when an AI uses resources that are misaligned to one\u2019s goal. Check out our <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/h\/rogue-ai-part-1.html\">previous blog<\/a> for definitions of types of Rogue AI before we get into today\u2019s question: how does an AI become misaligned?<\/p>\n<p><span class=\"body-subhead-title\">Alignment and Misalignment<\/span><\/p>\n<p>As AI systems become increasingly intelligent and tasked with more critical functions, inspecting the mechanism to understand why an AI took certain actions becomes impossible due to the volume of data and complexity of operations. The best way to measure alignment, then, is simply to observe the behavior of the AI. Questions to ask when observing include:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Is the AI taking actions contrary to express goals, policies, and requirements?<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Is the AI acting dangerously\u2014whether in terms of resource consumption, data disclosure, deceptive outputs, corrupting systems, or harming people?<\/span><\/li>\n<\/ul>\n<p>Maintaining proper alignment will be a key feature for AI services moving forward. But doing this reliably requires an understanding of how AI becomes misaligned in order to mitigate the risk.<\/p>\n<p><span class=\"body-subhead-title\">How Misalignment Happens<\/span><\/p>\n<p>One of the great challenges of the AI era will be the fact that there is no simple answer to this question. Techniques for understanding how an AI system becomes misaligned will change along with our AI architectures. Right now, prompt injection is a popular exploitation, though sort of command injection is particular to GPT. Model poisoning is another widespread concern, but as we implement new mitigations for this\u2014for example, tying training data to model weights verifiably\u2014risks will arise in other areas. Agentive AI is not fully baked yet, and no best practices have been established in this regard.<\/p>\n<p>What won\u2019t change are the two overarching types of misalignments:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Intentional, where someone is trying to use AI services (yours or theirs) to attack a system (yours or another).<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Unintentional, where your own AI service does not have the appropriate safeguards in place and become misaligned due to an error.<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Case Studies: Subverted Rogue AI<\/span><\/p>\n<p>As defined in the first blog in this series, a Subverted Rogue AI is the result of an attacker using existing AI deployments for their own purposes. These attacks are popular with LLMs and include prompt injections and jailbreaks and model poisoning.<\/p>\n<p><b>System Jailbreak: <\/b>The simplest subversion is directly overwriting the system prompt. Many AI services use a prompting architecture in two (or more) levels, usually a system prompt and user prompt. The system prompt adds common instructions around every user prompt, such as \u201cAs a helpful, polite assistant with knowledge about [domain], answer the following user prompt.\u201d Attackers use prompt jailbreaks to escape guardrails, often on dangerous or offensive material. Jailbreak prompts are widely available and can be used to subvert every use of an AI service when included in the system prompt. Insider threat attackers that replace system prompts with jailbreaks easily subvert protections, creating Rogue AI.<\/p>\n<p><b>Model Poisoning: <\/b>Intending to saturate the information space with disinformation, some Russian APT groups have poisoned many current LLMs. In a quest for as much data as possible (no matter what it is!) foundation model creators are ingesting anything they come across. Meanwhile, attackers seeking to sway public opinion create pink slime misinformation news feeds, free data for the training. The result is poisoned models that parrot disinformation as fact. They are Rogue AI, subverted to <a href=\"https:\/\/www.newsguardtech.com\/special-reports\/generative-ai-models-mimic-russian-disinformation-cite-fake-news\/\" target=\"_blank\" rel=\"noopener\">amplify the Russian APT\u2019s narrative<\/a>.<\/p>\n<p><span class=\"body-subhead-title\">Case Studies: Malicious Rogue AI<\/span><\/p>\n<p>A Malicious Rogue AI is one used by threat actors to attack your systems with an AI service of their own design. This can happen using your computing resources (malware) or someone else\u2019s (an AI attacker). It\u2019s still early for this type of attack; GenAI fraud, ransomware, 0-days exploits, and other familiar attacks are all still growing in popularity. But there are demonstrated examples of malicious rogue AI.<\/p>\n<p><b>AI Malware: <\/b>An attacker drops a small language model on target endpoints, disguising the download as a system update. The resulting program appears to be a standalone chatbot on cursory inspection. This malware uses the anti-evasion techniques of current infostealers but can also analyze data to determine if it matches the attacker\u2019s goals. Reading emails, PDFs, browsing history, and so on etc. for specific content allows the attacker to stay silent and report back only high value information.<\/p>\n<p><b>Proxy Attacker: <\/b>Upon installing traffic anonymization grayware, \u201cTrojanVPN,\u201d the user\u2019s system is checked for AI service use, credentials and authorization tokens. The system becomes an available \u201cAI bot\u201d whose service access is reported back to the grayware owners. The user system has access to GenAI tools including multilingual and multimodal capabilities, which can be sold to attackers to provide the content for their phishing, deepfake, or other fraud campaigns.<\/p>\n<p><span class=\"body-subhead-title\">Case Studies: Accidental Rogue AI<\/span><\/p>\n<p>Accidental Rogue AI occurs when an AI service unexpectedly behaves contrary to their its goals. This is generally due to a design flaw or bug. Common issues like hallucinations are not considered rogue, as they are always a possibility with GenAI based on token prediction. However, persistent issues may occur due to failure to monitor and protect data and access.<\/p>\n<p><b>Accidental Data Disclosure: <\/b>AI is only as powerful as the data it touches, and rushing to adopt pushes people to connect their data to AI services. When an internal help chatbot answers questions about career development with privileged individual salary information, it has gone rogue with this accidental data disclosure. Any protected information used by AI systems should be within a sandbox to ensure that the AI service\u2019s access to that data is limited to authorized use.<\/p>\n<p><b>Runaway Resource Consumption: <\/b>Current agentic AI frameworks allow an LLM orchestrator to create subproblems and solve them, often in parallel with another agentic AI component. If resource consumption is not carefully bounded, problem solving can create loops or recursive structures or find a strategy to use all available resources. If agentic AI creates a subproblem and are given the resource quota and authority of the original model, they can worm themselves. Beware AI that self-replicates!<\/p>\n<p>There are also many classic fictional examples of an Accidental Rogue AI harming people including HAL 9000 in <i>2001: A Space Odyssey<\/i> and Skynet in the <i>Terminator<\/i> series. Agentic AI harming or killing people has been a concern since the birth of AI as a concept, and this risk becomes more present as AI services are given greater ability to act.<\/p>\n<p><span class=\"body-subhead-title\">Prevention and Response<\/span><\/p>\n<p>Preventing, detecting, and responding to these emerging threats requires an understanding of causality. Accidental rogues require close resource monitoring, malicious rogues require data and network protection, and subverted rogues require authorization and content guardrails. We\u2019ll get into each of these measures in-depth in future blogs.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/i\/rogue-ai-part-2.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the second blog in an ongoing series on Rogue AI. Keep following for more technical guidance, case studies, and insights. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57008,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9520,9521,9511,9522],"class_list":["post-57007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-expert-perspective"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How AI Goes Rogue 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How AI Goes Rogue 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-03T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/rogue-ai-part-2:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How AI Goes Rogue\",\"datePublished\":\"2024-09-03T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/\"},\"wordCount\":1138,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/how-ai-goes-rogue.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Expert Perspective\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/\",\"name\":\"How AI Goes Rogue 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/how-ai-goes-rogue.jpg\",\"datePublished\":\"2024-09-03T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/how-ai-goes-rogue.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/how-ai-goes-rogue.jpg\",\"width\":979,\"height\":536},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-goes-rogue\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How AI Goes Rogue\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How AI Goes Rogue 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/","og_locale":"en_US","og_type":"article","og_title":"How AI Goes Rogue 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-09-03T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/rogue-ai-part-2:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How AI Goes Rogue","datePublished":"2024-09-03T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/"},"wordCount":1138,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/how-ai-goes-rogue.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Cloud","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Expert Perspective"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/","url":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/","name":"How AI Goes Rogue 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/how-ai-goes-rogue.jpg","datePublished":"2024-09-03T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/how-ai-goes-rogue.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/how-ai-goes-rogue.jpg","width":979,"height":536},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-goes-rogue\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"How AI Goes Rogue"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57007"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57007\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57008"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}