this post was submitted on 22 Apr 2026
152 points (99.4% liked)

Cybersecurity

9891 readers
92 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 22 comments
sorted by: hot top controversial new old
[–] panda_abyss@lemmy.ca 34 points 6 days ago

I guess Mythos didn’t tell them not to give contractors full access to everything.

[–] nabladabla@sopuli.xyz 23 points 5 days ago (3 children)

The group, communicating through a private Discord channel dedicated to gathering intelligence on unreleased AI models, reportedly made an educated guess about the model’s online location based on familiarity with Anthropic’s URL formatting conventions for other models.

So the whole access control was that they didn't advertise the name in the API?

[–] addie@feddit.uk 19 points 5 days ago (1 children)

Dang. If only they had some kind of security scanning tool that could catch that kind of thing.

[–] Randelung@lemmy.world 4 points 5 days ago

Some sort of fabricated smartness if you will. I've never been good with marketing terms.

[–] IchNichtenLichten@lemmy.wtf 5 points 5 days ago

They're just winging it, what a clown show.

It's almost like if you make stuff with AI, then AI can reliably guess what it would name everything and what directories they would put it in and more.

[–] burgermeister@sh.itjust.works 20 points 5 days ago (2 children)

Mythos didn't even find the vulns that it exploited, the "Firefox" that it attacked was an old version of Firefox's engine with all security protections disabled, and they admit that it cannot create full exploits. The whole Mythos thing is just marketing BS.

[–] fibojoly@sh.itjust.works 6 points 5 days ago (1 children)

You could say it's pure myth

[–] Randelung@lemmy.world 4 points 5 days ago

Always is. They said the same about GPT-2.

[–] ozoned@piefed.social 27 points 6 days ago (2 children)

This is very bad given other context in the article.

https://cybersecuritynews.com/anthropic-mythos-access/

"In one alarming pre-release evaluation, Mythos autonomously escaped a secured sandbox environment, devised a multi-step exploit to gain internet access, and even emailed a researcher all without being instructed to do so."

"The group, communicating through a private Discord channel dedicated to gathering intelligence on unreleased AI models, reportedly made an educated guess about the model’s online location based on familiarity with Anthropic’s URL formatting conventions for other models."

"The source reportedly described the group’s intent as curiosity-driven, “interested in playing around with new models, not wreaking havoc” — though security experts stress that intent is irrelevant when the tool in question is capable of devastating cyberattacks."

[–] itsathursday@lemmy.world 40 points 6 days ago (1 children)

Which security experts are stressing this and how is this not just PR from Anthropic?

[–] Not_mikey@lemmy.dbzer0.com 4 points 5 days ago* (last edited 5 days ago) (1 children)

Here's a release from the linux foundation echoing the concerns raised in the article

Equally important, early indications point to Claude Mythos Preview and other advanced AI models not only finding vulnerabilities but also providing viable patches. When I recently spoke with the Linux Project’s Greg Kroah-Hartman, he was initially skeptical, but more recently, he has told me that some of the patches generated by AI tools were “pretty good” – which is high praise, coming from him.

[–] dandi8@fedia.io 1 points 5 days ago

and other advanced AI models

Mythos isn't bringing anything new to the table.

[–] ohshit604@sh.itjust.works 8 points 5 days ago

Mythos autonomously escaped a secured sandbox environment

Doesn’t sound like it was secure.

[–] bitteroldcoot@piefed.social 19 points 6 days ago

So a software so dangerous it can't be released to the general public. Is sold to select clients, and then leaked to a hacking group. Oh this is going to end really really badly.

Apocryphal Lenin quote “When it comes time to hang the capitalists, they will vie with each other for the rope contract.”

[–] Lettuceeatlettuce@lemmy.ml 10 points 5 days ago

Dang, crazy how secure everything is now because of AI! They were correct, we can fire all the cyber security experts and devs right now, AI can do it all so much faster and better, right?

[–] mindbleach@sh.itjust.works 4 points 5 days ago

'We've limited access to this super duper hacking tool to stop master hackers from getting it and OHH NOOO!' is the plot of a beloved trash sci-fi movie, not news I can take seriously.

That took, what, not even 2 weeks?

[–] happydoors@lemmy.world 1 points 5 days ago* (last edited 5 days ago)

And so it begins, the clone wars has

[–] NigelFrobisher@aussie.zone 1 points 5 days ago

Tools like this were never not getting out. Who will get hit first?