NEWYou tin present perceive to Fox News articles!
There is simply a caller AI exemplary called Mythos. Anthropic built it for antiaircraft cybersecurity research. It is truthful effectual astatine uncovering bundle vulnerabilities that Anthropic decided the wide nationalist cannot person it. Instead, they are letting a tiny ellipse of trusted partners similar Microsoft and Google experimentation with it first, nether controlled conditions, portion researchers fig retired what guardrails request to exist.
That determination unsocial should archer you something. When the institution that built a instrumentality decides the satellite is not acceptable for it, you wage attention. And erstwhile you recognize what Mythos really did during testing, that caution starts to marque implicit sense.
Sign up for my FREE CyberGuy Report
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com - trusted by millions who ticker CyberGuy connected TV daily.
- Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
WINDOWS PCS AT RISK AS NEW TOOL DISARMS BUILT-IN SECURITY

Anthropic’s Mythos AI uncovered much than 2,000 chartless bundle vulnerabilities successful conscionable 7 weeks, showing however accelerated AI tin present exposure hidden weaknesses. (Gabby Jones/Bloomberg via Getty Images)
How Anthropic's Mythos AI recovered 2,000 vulnerabilities successful 7 weeks
Seven weeks. One AI model. One team. More than 2,000 antecedently chartless bundle vulnerabilities were found. If you request a infinitesimal with that, instrumentality it. John Ackerly, CEO and Co-Founder of Virtru, a information information company, enactment that fig into position successful a mode that is hard to shake.
"Mythos is perfectly a turning constituent for cybersecurity. Think astir it. Mythos didn't prime a lock; it recovered thousands of locks that were ne'er locked successful the archetypal spot (that nary 1 adjacent knew existed) successful bundle that the champion quality information researchers had studied for decades.
The mathematics is staggering. One AI model, and 1 team, successful 7 weeks, recovered much than 2,000 zero-day vulnerabilities. That is 30% of the world's full yearly output anterior to AI. When thousands of researchers get entree to AI models similar Mythos, a azygous twelvemonth volition aboveground exponentially much zero-days than the 360,000 recorded successful each of bundle history.
Mythos and different AI models similar it tin present find and exploit bundle flaws astatine a velocity and standard that is beyond containment. This means that the aged attack of gathering stronger walls astir systems and hoping they clasp is becoming overmuch little reliable. It besides means that the manual 'find a vulnerability, spot the vulnerability' process is not going to support gait with a menace scenery bolstered by the velocity and standard of AI.
The menace aboveground is present expanding faster than immoderate partition tin incorporate it. The lone reply to this caller dynamic is to support the information itself, alternatively than prop up perimeter extortion astir it."
Thirty percent of the world’s yearly output successful 7 weeks changes the crippled entirely.
What makes Mythos AI antithetic from different AI information tools
Cybersecurity teams person utilized AI tools for years. So what makes this different?
Ackerly explains it this way: "What makes this antithetic is the level of autonomy and velocity it enables. Mythos is being described arsenic a strategy that tin observe vulnerabilities and adjacent make moving exploits overmuch faster than accepted human-led workflows. This exemplary could marque it casual for a atrocious histrion to place and exploit vulnerabilities successful software, adjacent if that atrocious histrion isn't knowledgeable oregon trained."
That past portion matters most. Before a instrumentality similar this, exploiting a superior bundle vulnerability required existent method skill. Mythos AI lowers that obstruction significantly. A idiosyncratic with atrocious intentions and nary method inheritance could perchance usage a exemplary similar this to origin superior damage. The expertise spread that erstwhile offered immoderate earthy extortion is closing.
FAKE PAYPAL EMAIL LET HACKERS ACCESS COMPUTER AND BANK ACCOUNT

Security experts pass that tools similar Mythos could shrink the clip it takes to find and exploit flaws from weeks down to minutes. (Patrick Sison/AP Photo)
Why Anthropic's Mythos AI is breaking down perimeter security
Most cybersecurity spending, the overwhelming bulk of it, goes toward what experts telephone perimeter defense. Think firewalls, web monitoring, endpoint information and intrusion detection. The full strategy is built connected 1 halfway idea: support the atrocious actors out, and the information wrong stays safe.
Ackerly describes however that exemplary is present breaking down.
"The perimeter is the integer partition astir your systems and the accusation you possess. For decades, cyber strategies person chiefly focused connected the thought that if you protected the perimeter good capable - if you built a beardown capable partition - the delicate information connected the wrong would enactment safe. The manufacture has poured hundreds of billions of dollars into firewalls, endpoint detection, web security, exertion security, and different perimeter defenses.
Traditional information architecture by itself cannot support gait successful this caller world.
The Mythos improvement from Anthropic is making a hard information precise apparent: clip is moving retired for companies to hole for this caller reality. Shifting absorption from 'protecting the perimeter' to 'protecting the data' is critically important to mitigate information nonaccomplishment oregon compromise."
Hundreds of billions of dollars. And present the exemplary those dollars were built connected is becoming unreliable. It forces a afloat rethink.
Does Anthropic's Mythos AI springiness attackers the advantage?
This is the question everyone wants a consecutive reply to. Ackerly offers 1 that is much nuanced than a elemental yes oregon no.
"I wouldn't framework it arsenic attackers automatically having an advantage. But implicit time, it does mean that 'bad guys' and 'good guys' volition person entree to fundamentally the aforesaid tools. As a result, I bash deliberation defenders perfectly request a antithetic strategy. If you presume the outer partition whitethorn fail, past the smarter determination is to support the information itself truthful it stays controlled adjacent aft a breach."
The playing tract is leveling. And that whitethorn dependable just until you retrieve attackers lone request to win once, portion defenders person to win each time.
How accelerated is Mythos AI changing the cybersecurity menace landscape?
Speed is what makes Mythos AI genuinely alarming. Traditional cyberattacks determination done a lifecycle. Reconnaissance takes time. Finding the close vulnerability takes much time. Building an exploit takes much clip connected apical of that.
Ackerly explains what happens erstwhile AI compresses each of that.
"AI is accelerating the threat. A exemplary that tin find and exploit vulnerabilities autonomously compresses the onslaught lifecycle from weeks to hours, oregon adjacent minutes. Every furniture of the accepted information stack present has to run astatine instrumentality speed. Manual information architectures cannot support up.
But AI besides makes data-centric information much powerful, not little so. When each portion of delicate information is protected astatine the object-level, AI agents tin enforce governance astatine standard by checking entitlements, applying attribute-based entree controls, and auditing information flows successful existent time. The aforesaid capabilities that marque Mythos a unsafe instrumentality successful the hands of 'bad guys' marque it a invaluable instrumentality successful the hands of 'good guys'.
The question organizations should beryllium asking shifts from "how bash I physique higher walls?" to "when the walls fail, is my information inactive protected?" That is the question worthy sitting with.
What Mythos AI means for regular people's idiosyncratic data
Most of the Mythos sum has focused connected firm risk. But your slope relationship and aesculapian records beryllium successful those aforesaid susceptible systems.
"For mundane people, the archetypal alteration is that breaches and scams could go much frequent, much targeted, and harder to spot. If AI makes it easier to uncover anemic points successful the systems we each trust on, that tin construe into much unit connected the services that clasp our idiosyncratic data, from email and unreality retention to health, banking, and retail platforms.
Consumers shouldn't presume a institution is doing the close happening with their data. Now, they truly can't presume a company's outer defenses are capable to support their information.
This besides highlights the value of basal cyber hygiene similar unsocial passwords and MFA, truthful that erstwhile breaches happen, the scope of interaction connected your ain idiosyncratic information is contained."
Your slope account, your aesculapian records, your taxation documents, your backstage messages. All of it already lives crossed dozens of platforms you spot to support it. If those platforms' outer defenses are nary longer reliable, what precisely is lasting betwixt your information and idiosyncratic who wants it?
Ackerly goes further connected wherever the vulnerability really lives. "Data present travels crossed clouds, devices, partners, and borders. The hazard isn't conscionable 1 hacked server successful 1 gathering anymore. It's each the places your information passes done oregon gets copied to on the way.
Was Anthropic close to support Mythos AI restricted?
Anthropic made a prime that is uncommon successful the AI industry. They built thing almighty and past decided not to merchandise it widely.
On that decision, Ackerly is direct. "Anthropic's determination to withhold Mythos from wide merchandise is unprecedented and, frankly, responsible. Time volition archer what these partners are capable to bash with respect to safety, but releasing it to the wide nationalist would surely person been ill-advised and dangerous."
Unprecedented. That connection deserves value here. In an manufacture that races to merchandise caller tech, Anthropic stopped. That speaks volumes.
We reached retired to Anthropic for a comment, but did not perceive backmost earlier our deadline.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

As AI accelerates cyberattacks, the absorption is shifting from protecting networks to protecting the information itself. (Kury "CyberGuy" Knutsson)
How to enactment harmless arsenic cybersecurity shifts
The perimeter exemplary is deteriorating, but that does not mean you are helpless. Individual behaviour inactive matters, and it matters much present than it did before.
Ackerly's proposal is this: "Stop assuming the app, platform, oregon institution perimeter tin ever support your information, oregon that they volition bash the close happening with your data. People should beryllium overmuch much deliberate astir what information they share, wherever they store it, and who tin entree it. Protection needs to question with the data, not conscionable beryllium astatine the borderline of a network. For you, that means choosing services that springiness you stronger power implicit your accusation and being much cautious astir oversharing delicate information successful the archetypal place. The information proprietor should ever person governance implicit said data." So wherever bash you start?
1) Use unsocial passwords for each account
A password manager makes this realistic. If 1 level gets breached, unsocial passwords support the harm isolated to that 1 account.
2) Turn connected multi-factor authentication wherever it is available
Multi-factor authentication (MFA) adds a furniture that survives adjacent erstwhile a password is compromised. It is 1 of the highest-impact steps an idiosyncratic tin take.
3) Run beardown antivirus bundle and support devices updated
Outdated bundle is 1 of the astir communal introduction points attackers use. Strong antivirus bundle catches threats your instincts mightiness miss, and keeping apps and operating systems existent closes the gaps that models similar Mythos are built to find. Get my picks for the champion 2026 antivirus extortion winners for your Windows, Mac, Android & iOS devices astatine Cyberguy.com
4) Be selective astir what you stock and where
Every app that holds your information is simply a imaginable vulnerability point. The little you overshare, the smaller your footprint becomes.
5) Use a information removal service
Data brokers cod and merchantability your idiosyncratic information, often without you ever knowing. Data removal services find wherever your information is listed and petition its removal. You cannot power each spot your accusation travels, but you tin shrink the way it leaves behind. Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com
6) Choose services that connection existent information control
Not each platforms dainty your information the aforesaid way. Look for services that fto you see, negociate and bounds however your accusation is utilized and wherever it goes.
7) Monitor your accounts and credit
Catching a breach aboriginal limits the harm significantly. Set up relationship alerts wherever your slope oregon fiscal level allows it. A recognition frost costs thing and stops caller accounts from being opened successful your sanction without your knowledge.
8) Stay skeptical of phishing attempts
Ackerly warned that scams volition get much targeted and harder to spot arsenic AI lowers the obstruction for atrocious actors. Scrutinize each nexus earlier you click it and dainty unexpected emails oregon texts asking for login accusation arsenic suspicious by default. If thing feels off, it astir apt is.
9) Assume breaches volition happen
The extremity is to bounds however overmuch harm they tin do. When you run with that assumption, your decisions astir information hygiene get sharper, and your vulnerability gets smaller.
Take my quiz: How harmless is your online security?
Think your devices and information are genuinely protected? Take this speedy quiz to spot wherever your integer habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing close and what needs improvement. Take my Quiz here: Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt's cardinal takeaways
Mythos did not make the vulnerability problem. It made the standard of it disposable successful a mode that is nary longer ignorable. The instauration of modern cybersecurity, the thought that beardown capable walls volition support information safe, is being tested successful existent clip by a exertion that moves faster than immoderate quality squad can. That is simply a user communicative arsenic overmuch arsenic it is simply a firm one. Your information lives successful systems built connected that aged model. And the infinitesimal to deliberation otherwise astir however it is protected is now, not aft the adjacent large breach makes the headlines. Anthropic made a liable telephone by limiting entree to Mythos. But the exemplary exists. The capableness is real. Other versions of it are being developed. The question for each enactment and each idiosyncratic becomes the aforesaid 1 Ackerly keeps returning to.
When the walls fail, and experts are telling america they will, what is really protecting your information connected the different side? Let america cognize your thoughts by penning to america astatine Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
- For simple, real-world ways to spot scams aboriginal and enactment protected, sojourn CyberGuy.com - trusted by millions who ticker CyberGuy connected TV daily.
- Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.








.png)

English (CA) ·
English (US) ·
Spanish (MX) ·