Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
LECS 970x120 1
Towards AGI: Google DeepMind warns, AI could ignore humans

Towards AGI: Google DeepMind warns, AI could ignore humans

24 September 2025 07:12

Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This paper examines how generative models can run amok and pose a threat . It considers scenarios in which the AI ignores users’ attempts to stop it.

DeepMind’s approach is based on so-called “Critical Capability Levels” (CCLs) . This is a scale for assessing the point at which a model’s behavior becomes dangerous, for example in cybersecurity or biotechnology.

The document describes the steps developers should take when their systems reach a certain level of risk.

The researchers cite the model’s potential for weight loss as a major threat. If these losses fall into the hands of malicious actors, they could disable the built-in limitations and use the AI to create malware or even develop biological weapons . Another risk is manipulative behavior.

DeepMind warns that chatbots could influence people’s worldviews, though it notes that this is a “low-velocity threat” that the company is currently addressing with its own defense mechanisms.

Particular attention is paid to “uncoordinated AI,” or systems that begin to ignore instructions or act against human interests. Cases of deceptive or stubborn models have already been recorded.

In the future, such systems may develop effective “simulated reasoning,” but without verifiable intermediate steps. This means that monitoring their processes will become virtually impossible.

There are currently no proposals for a definitive solution to this problem. DeepMind only recommends using automated monitoring to analyze intermediate model results and identify any signs of inconsistency.

However, the researchers themselves acknowledge that too little is still known about how modern AIs arrive at their responses and that the threat could intensify in the coming years.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.