this post was submitted on 22 Apr 2026
115 points (99.1% liked)

Cybersecurity

9980 readers
162 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 21 comments
sorted by: hot top controversial new old
[–] panda_abyss@lemmy.ca 24 points 3 weeks ago

I guess Mythos didn’t tell them not to give contractors full access to everything.

[–] nabladabla@sopuli.xyz 20 points 3 weeks ago (3 children)

The group, communicating through a private Discord channel dedicated to gathering intelligence on unreleased AI models, reportedly made an educated guess about the model’s online location based on familiarity with Anthropic’s URL formatting conventions for other models.

So the whole access control was that they didn't advertise the name in the API?

[–] addie@feddit.uk 14 points 3 weeks ago (1 children)

Dang. If only they had some kind of security scanning tool that could catch that kind of thing.

[–] Randelung@lemmy.world 4 points 3 weeks ago

Some sort of fabricated smartness if you will. I've never been good with marketing terms.

[–] IchNichtenLichten@lemmy.wtf 4 points 3 weeks ago

They're just winging it, what a clown show.

It's almost like if you make stuff with AI, then AI can reliably guess what it would name everything and what directories they would put it in and more.

[–] ozoned@piefed.social 19 points 3 weeks ago (2 children)

This is very bad given other context in the article.

https://cybersecuritynews.com/anthropic-mythos-access/

"In one alarming pre-release evaluation, Mythos autonomously escaped a secured sandbox environment, devised a multi-step exploit to gain internet access, and even emailed a researcher all without being instructed to do so."

"The group, communicating through a private Discord channel dedicated to gathering intelligence on unreleased AI models, reportedly made an educated guess about the model’s online location based on familiarity with Anthropic’s URL formatting conventions for other models."

"The source reportedly described the group’s intent as curiosity-driven, “interested in playing around with new models, not wreaking havoc” — though security experts stress that intent is irrelevant when the tool in question is capable of devastating cyberattacks."

[–] itsathursday@lemmy.world 26 points 3 weeks ago (1 children)

Which security experts are stressing this and how is this not just PR from Anthropic?

[–] Not_mikey@lemmy.dbzer0.com 4 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Here's a release from the linux foundation echoing the concerns raised in the article

Equally important, early indications point to Claude Mythos Preview and other advanced AI models not only finding vulnerabilities but also providing viable patches. When I recently spoke with the Linux Project’s Greg Kroah-Hartman, he was initially skeptical, but more recently, he has told me that some of the patches generated by AI tools were “pretty good” – which is high praise, coming from him.

[–] dandi8@fedia.io 1 points 3 weeks ago

and other advanced AI models

Mythos isn't bringing anything new to the table.

[–] ohshit604@sh.itjust.works 5 points 3 weeks ago

Mythos autonomously escaped a secured sandbox environment

Doesn’t sound like it was secure.

[–] burgermeister@sh.itjust.works 13 points 3 weeks ago (2 children)

Mythos didn't even find the vulns that it exploited, the "Firefox" that it attacked was an old version of Firefox's engine with all security protections disabled, and they admit that it cannot create full exploits. The whole Mythos thing is just marketing BS.

[–] fibojoly@sh.itjust.works 5 points 3 weeks ago (1 children)

You could say it's pure myth

[–] Randelung@lemmy.world 3 points 3 weeks ago

Always is. They said the same about GPT-2.

[–] bitteroldcoot@piefed.social 12 points 3 weeks ago

So a software so dangerous it can't be released to the general public. Is sold to select clients, and then leaked to a hacking group. Oh this is going to end really really badly.

Apocryphal Lenin quote “When it comes time to hang the capitalists, they will vie with each other for the rope contract.”

[–] Lettuceeatlettuce@lemmy.ml 6 points 3 weeks ago

Dang, crazy how secure everything is now because of AI! They were correct, we can fire all the cyber security experts and devs right now, AI can do it all so much faster and better, right?

[–] recklessengagement@lemmy.world 2 points 3 weeks ago

That took, what, not even 2 weeks?

[–] mindbleach@sh.itjust.works 2 points 3 weeks ago

'We've limited access to this super duper hacking tool to stop master hackers from getting it and OHH NOOO!' is the plot of a beloved trash sci-fi movie, not news I can take seriously.

[–] happydoors@lemmy.world 1 points 3 weeks ago* (last edited 3 weeks ago)

And so it begins, the clone wars has

[–] JoMiran@lemmy.ml -3 points 3 weeks ago

Anyone that knows anything about Mythos should be very concerned. This headline should be everywhere.