What's Hot

    SoFi’s inventory rises as CEO Anthony Noto reacts to latest selloff with a $1 million buy | Invesloan.com

    March 2, 2026

    Musk touts new Grok 4.20 as solely ‘non-woke’ AI chatbot presently obtainable | Invesloan.com

    March 2, 2026

    Some Middle East Flights Resume however Confusion Reigns From Iran Strikes | Invesloan.com

    March 2, 2026
    Facebook Twitter Instagram
    Finance Pro
    Facebook Twitter Instagram
    invesloan.cominvesloan.com
    Subscribe for Alerts
    • Home
    • News
    • Politics
    • Money
    • Personal Finance
    • Business
    • Economy
    • Investing
    • Markets
      • Stocks
      • Futures & Commodities
      • Crypto
      • Forex
    • Technology
    invesloan.cominvesloan.com
    Home » An $18-an-Hour AI Agent Outperformed Human Hackers in Stanford Study | Invesloan.com
    Money

    An $18-an-Hour AI Agent Outperformed Human Hackers in Stanford Study | Invesloan.com

    December 12, 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email

    For 16 hours, an AI agent crawled Stanford’s public and private computer science networks, digging up security flaws across thousands of devices.

    By the end of the test, it had outperformed professional human hackers — and at a fraction of the cost.

    A study published Wednesday by Stanford researchers found that their AI agent, ARTERMIS, placed second in an experiment with 10 selected cybersecurity professionals. The researchers said the agent could uncover weaknesses that humans missed and investigate several vulnerabilities at once.

    Running ARTEMIS costs about $18 an hour, far below the average salary of about $125,000 a year for a “professional penetration tester,” the study said. A more advanced version of the agent costs $59 an hour and still comes in cheaper than hiring a top human expert.

    The study was led by three Stanford researchers — Justin Lin, Eliot Jones, and Donovan Jasper — whose work focuses on AI agents, cybersecurity, and machine-learning safety. The team created ARTEMIS after finding that existing AI tools struggled with long, complex security tasks.

    The researchers gave ARTEMIS access to the university’s network, consisting of about 8,000 devices, including servers, computers, and smart devices. Human testers were asked to put in at least 10 hours of work while ARTEMIS ran 16 hours across two workdays. The comparison with human testers was limited to the AI’s first 10 hours.

    The study also tested existing agents, which lagged behind most human participants, while ARTEMIS performed “comparable to the strongest participants,” the researchers said.

    Within the 10-hour window, the agent discovered “nine valid vulnerabilities with an 82% valid submission rate,” outperforming nine of 10 human participants, the study said.

    Some of the flaws had gone unnoticed by humans, including a weakness on an older server that testers could not access because their browsers refused to load it. ARTEMIS bypassed the issue and broke in using a command-line request.

    The AI worked in a way humans could not, the researchers said. Whenever ARTEMIS spotted something “noteworthy” in a scan, it spun up additional “sub-agents” to investigate in the background, allowing it to examine multiple targets simultaneously. Human testers had to do this work one step at a time.

    But the AI isn’t flawless. ARTEMIS struggled with tasks that required clicking through graphical screens, causing it to overlook a critical vulnerability. It is also more prone to false alarms, mistaking harmless network messages for signs of a successful break-in.

    “Because ARTEMIS parses code-like input and output well, it performs better when graphical user interfaces are unavailable,” the researchers said.

    AI is making hacking easier

    Advances in AI have lowered the barrier to hacking and disinformation operations, allowing malicious actors to enhance their attacks.

    In September, a North Korean hacking group used ChatGPT to generate fake military IDs for phishing emails. A report from Anthropic in August found that North Korean operatives used its Claude model to obtain fraudulent remote jobs at US Fortune 500 tech companies — a tactic that gave them insider access to corporate systems.

    The same report also said a Chinese threat actor used Claude to run cyberattacks on Vietnamese telecom, agricultural, and government systems.

    “We are seeing many, many attacks,” Yuval Fernbach, the chief technology officer of machine learning operations at software supply chain company JFrog, told Business Insider in a report published in April. He added that hackers have been using AI models to extract data, shut systems down, or manipulate a website or tools.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Keep Reading

    Some Middle East Flights Resume however Confusion Reigns From Iran Strikes | Invesloan.com

    Amazon Says 3 Data Centers Damaged by Drone Strikes in Middle East | Invesloan.com

    Satellite Image Shows Iran’s Largest Warship, a Former Tanker, on Fire | Invesloan.com

    I Flew to Dubai for My Birthday, Got Stranded After US Strikes on Iran | Invesloan.com

    Dimon on Trump’s Lawsuit: He Would Be ‘Angry Too’ If He Were Debanked | Invesloan.com

    Photos Show Israel’s Stealth Fighter Jets Used to Attack Iran | Invesloan.com

    Bernie Sanders, Ro Khanna Unveil New 5% Billionaire Wealth Tax | Invesloan.com

    I Graduated From College, Got a Job in My Field, Then Gave It All up | Invesloan.com

    National Air and Space Museum Features Space Shuttle, Air Force Planes | Invesloan.com

    LATEST NEWS

    SoFi’s inventory rises as CEO Anthony Noto reacts to latest selloff with a $1 million buy | Invesloan.com

    March 2, 2026

    Musk touts new Grok 4.20 as solely ‘non-woke’ AI chatbot presently obtainable | Invesloan.com

    March 2, 2026

    Some Middle East Flights Resume however Confusion Reigns From Iran Strikes | Invesloan.com

    March 2, 2026

    Apple launches new iPhone and iPad Air because it gears up for a significant AI push | Invesloan.com

    March 2, 2026
    POPULAR

    China’s first passenger jet completes maiden commercial flight

    May 28, 2023

    Numbers taking US accountancy exams drop to lowest level in 17 years

    May 29, 2023

    Toyota chair faces removal vote over governance issues

    May 29, 2023
    Advertisement
    Load WordPress Sites in as fast as 37ms!
    Facebook Twitter Pinterest WhatsApp Instagram
    © 2007-2023 Invesloan.com All Rights Reserved.
    • Privacy
    • Terms
    • Press Release
    • Advertise
    • Contact

    Type above and press Enter to search. Press Esc to cancel.

    invesloan.com
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}