Agregátor RSS

Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox

Computerworld.com [Hacking News] - 23 Duben, 2026 - 03:35

The Claude Mythos Preview appears to be living up to the hype, at least from a cybersecurity standpoint. The model, which Anthropic rolled out to a small group of users, including Firefox developer Mozilla, earlier this month, has discovered 271 vulnerabilities in version 148 of the browser. All have been fixed in this week’s release of Firefox 150, Mozilla emphasized.

These findings set a new precedent in AI’s ability to unearth bugs, and could turbocharge cybersecurity efforts.

“Nothing Mythos found couldn’t have been found by a skilled human,” said David Shipley of Beauceron Security. “The AI is not finding a new class of AI-exclusive super bugs. It’s just finding a lot of stuff that was missed.”

However, the news comes as Anthropic is reportedly investigating unauthorized use of Mythos by a small group who reportedly gained access via a third party vendor environment, revealing the double-edged nature of AI.

Closing the fuzzing gap

Firefox has previously pointed AI tools, notably Anthropic’s Claude Opus 4.6, at its browser in a quest for vulnerabilities, but Opus discovered just 22 security-sensitive bugs in Firefox 148, while Mythos uncovered more than ten times that many.

Firefox CTO Bobby Holley described the sense of “vertigo” his team felt when they saw that number. “For a hardened target, just one such bug would have been red-alert in 2025,” he wrote in a blog post, “and so many at once makes you stop to wonder whether it’s even possible to keep up.”

Firefox uses a defense-in-depth strategy, with internal red teams applying multiple layers of “overlapping defenses” and automated analysis techniques, he explained. Teams run each website in a separate process sandbox.

However, no layer is impenetrable, Holley noted, and attackers combine bugs in the rendering code with bugs in the sandboxes in an attempt to gain privileged access. While his team has now adopted a more secure programming language, Rust, the developers can’t afford to stop and rewrite the decades’ worth of existing C++ code, “especially since Rust only mitigates certain, (very common) classes of vulnerabilities.”

While automated analysis techniques like fuzzing, which uncovers vulnerabilities or bugs in source code, are useful, some bits of code are more difficult to fuzz than others, “leading to uneven coverage,” Holley pointed out. Human teams can find bugs that AI can’t by reasoning through source code, but this is time-consuming, and is bottlenecked due to limited human resources.

Now, Claude Mythos Preview is closing this gap, detecting bugs that fuzzing doesn’t surface.

“Computers were completely incapable of doing this a few months ago, and now they excel at it,” Holley noted. Mythos Preview is “every bit as capable” as human researchers, he asserted, and there is no “category or complexity” of vulnerability that humans can find that Mythos can’t.

Defenders now able to win ‘decisively’?

Gaps between human-discoverable and AI-discoverable bugs favor attackers, who can afford to concentrate months of human effort to find just one bug they can exploit, Holley noted. Closing this gap with AI can help defenders erode that long-term advantage.

The industry has largely been fighting security “to a draw,” he acknowledged, and security has been “offensively-dominant” due to the size of the attack surface, giving adversaries an “asymmetric advantage.” In the face of this, both Mozilla and security vendors have “long quietly acknowledged” that bringing exploits to zero was “unrealistic.”

But now with Mythos (and likely subsequent models), defenders have a chance to win, “decisively,” Holley asserted. “The defects are finite, and we are entering a world where we can finally find them all.”

What security teams should do now

Finding 271 flaws in a mature codebase like Firefox illustrates the fact that AI-driven vulnerability discovery is now operating at a scale and depth that can outpace traditional human-led review, noted Ensar Seker, CISO at cyber threat intelligence company SOCRadar.

Holley’s “vertigo,” he said, was because defenders are realizing the attack surface is larger, and “more rapidly discoverable than previously assumed.”

Security teams must respond by shifting from periodic testing to continuous validation, Seker advised. That means integrating AI-assisted code analysis into continuous integration/continuous delivery (CI/CD) pipelines, prioritizing “patch velocity over perfection,” and assuming that any externally reachable code path will eventually be discovered and weaponized.

“The goal is no longer just finding vulnerabilities first, but reducing the window between discovery and remediation,” he said.

Shipley agreed that any company building software must evaluate resourcing so it can quickly and proactively find and fix vulnerabilities. “But stuff will happen,” he acknowledged. So, in addition to doing proactive work, enterprises must regularly exercise their incident response playbooks.

“The next few years are going to be a marathon, not a sprint,” said Shipley.

Dual-use nature of AI is a challenge

However, the dual-use nature of these systems present a big challenge. The same capability that helps defenders identify hundreds of flaws can be turned against them if the model or its outputs are exposed, Seker pointed out.

The reported unauthorized access to Mythos “reinforces that AI systems themselves are now high-value targets, effectively becoming part of the attack surface,” he said.

It’s not at all surprising that people found a way to access Mythos, Shipley agreed; it was inevitable. “Nor does Anthropic have some unique, insurmountable or exclusive AI capability for hacking,” he said, pointing out that OpenAI is already catching up in that regard, and others will “catch and surpass” Mythos.

Striking a balance requires treating AI models like privileged infrastructure, Seker noted. Enterprises need strict access controls, output monitoring, and isolation of sensitive workflows. Developers, meanwhile, must adapt by writing code that is resilient to automated scrutiny; this requires stronger input validation, safer defaults, and “fewer assumptions about obscurity.”

“In this paradigm, security isn’t just about defending systems; it’s about defending the tools that are now capable of breaking them at scale,” Seker emphasized.

This article originally appeared on CSOonline.

Kategorie: Hacking & Security

Another npm supply chain worm is tearing through dev environments

The Register - Anti-Virus - 23 Duben, 2026 - 00:34
Plus, the payload references 'TeamPCP/LiteLLM method'

Yet another npm supply-chain attack is worming its way through compromised packages, stealing secrets and sensitive data as it moves through developers' environments, and it shares significant overlap with the open source infections attributed to TeamPCP last month.…

Kategorie: Viry a Červi

Kde při tankování ušetřit: Přehled slev a věrnostních programů čerpacích stanic

Lupa.cz - články - 23 Duben, 2026 - 00:00
Benzinky lákají řidiče na slevy, body i odměny. Podívali jsme se, co jejich věrnostní programy nabízejí a zda do nich promluvily cenové stropy.
Kategorie: IT News

Když škodu způsobí více osob, poškozený si může vybrat, kdo ji zaplatí. Pravidlo však má výjimku

Lupa.cz - články - 23 Duben, 2026 - 00:00
Uplatní se solidární odpovědnost, i když škodu způsobil zaměstnanec společně s osobou, která zde není zaměstnána? Nebo půjde jen o dílčí samostatnou odpovědnost pracovníka?
Kategorie: IT News

Pokusy s MeshCore: vlastní repeater, spojení přes republiku a klient Meshy

ROOT.cz - 23 Duben, 2026 - 00:00
Několik postřehů z používání decentralizované sítě MeshCore za poslední dva měsíce. Síť se neuvěřitelně rozrostla a já jsem přispěl stavbou vlastního repeateru a napsáním linuxového klienta s názvem Meshy.
Kategorie: GNU/Linux & BSD

SciPy: konvoluce, fitrace a další operace prováděné s dvourozměrnými signály

ROOT.cz - 23 Duben, 2026 - 00:00
Dokončíme popis operací, které je možné provádět s dvourozměrnými signály, tj. především s rastrovými obrázky. Ukážeme si zejména klasickou konvoluci s konvolučním jádrem zadaným maticí a funkce balíčku ndimage.
Kategorie: GNU/Linux & BSD

Technologie metajetů: Dostane naše sondy ke hvězdám pokročilý optický pohon?

OSEL.cz - 23 Duben, 2026 - 00:00
S velkou pompou propagovaný miliardářský projekt Breakthrough Starshot vyšuměl do ztracena. Vědci ale na technologie optického pohonu kosmických lodí úplně nezanevřeli. Tým Texas A&M University vytvořil metajety, zařízení tvořená metapovrchy, která důmyslným způsobem reagují na dopadající světlo. Stane se z nich časem nový typ pohonu?
Kategorie: Věda a technika

Dinosauří nemoci a patologie

OSEL.cz - 23 Duben, 2026 - 00:00
…aneb Zdravotní karta z druhohorní éry
Kategorie: Věda a technika

Víc než smajlík: Emodži spouštějí v mozku reakce jako skutečné tváře

OSEL.cz - 23 Duben, 2026 - 00:00
Měly to být jen takové veselé obrázky, které měly okořenit elektronickou komunikaci. Jak se ale ukázalo, lidský mozek čte emodži, především ty, co mají tvar obličeje, jako skutečné lidské tváře a vnímá jejich emoce. Emodži se díky tomu staly nesmírně populárními, ale možná by se na ně měl vydávat zbrojní pas.
Kategorie: Věda a technika

Novinky ve výzkumu gravitačních vln – 3. díl

OSEL.cz - 23 Duben, 2026 - 00:00
V oboru gravitačních vln a gravitační astronomie se stále něco děje, takže i když od posledního dílu našeho seriálu neuplynulo ještě tolik času, myslím, že má smysl se podívat na některé zajímavé novinky, které se v tomto oboru za tu dobu udály. A tyto novinky opravdu stojí za to, jak uvidíte sami. Zvláště některé jsou totiž opravdu vzrušující. Tak se nezdržujme a pojďme na to. A začněme tentokrát na povrchu Země u observatoře LIGO, na něco o kosmických misích se můžete těšit na konci článku.
Kategorie: Věda a technika

Intel: Vydáme více odemčených procesorů. DIIT: Problémem ale nejsou procesory

CD-R server - 23 Duben, 2026 - 00:00
Intel vydal prohlášení, podle kterého vyjde vstříc taktujícím uživatelům tím, že vydá více procesorů Core s podporou přetaktování. Jenže aktuálně nejsou limitujícím prvkem přetaktování procesory…
Kategorie: IT News

Anthropic's super-scary bug hunting model Mythos is shaping up to be a nothingburger

The Register - Anti-Virus - 22 Duben, 2026 - 23:39
Hackpocalypse deferred

Anthropic's Mythos model is purportedly so good at finding vulnerabilities that the Claude-maker is afraid to make it available to the general public for fear that criminals will take advantage. But early analysis shows that Mythos may not be as dangerous as some would have you believe.…

Kategorie: Viry a Červi

Apple fixes bug that let the FBI recover deleted Signal messages

Bleeping Computer - 22 Duben, 2026 - 22:58
Apple has released out-of-band security updates for iPhone and iPad devices to fix a Notification Services flaw that could allow notifications marked for deletion to remain stored on the device. [...]
Kategorie: Hacking & Security

New Mirai campaign exploits RCE flaw in EoL D-Link routers

Bleeping Computer - 22 Duben, 2026 - 22:04
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet. [...]
Kategorie: Hacking & Security

LilyPond 2.26.0

AbcLinuxu [zprávičky] - 22 Duben, 2026 - 21:55
LilyPond (Wikipedie) , tj. multiplatformní svobodný software určený pro sazbu notových zápisů, byl vydán ve verzi 2.26.0. Přehled novinek v aktualizované dokumentaci.
Kategorie: GNU/Linux & BSD

Microsoft issues emergency update for macOS and Linux ASP.NET threat

Ars Technica - 22 Duben, 2026 - 21:32

Microsoft released an emergency patch for its ASP.NET Core to fix a high-severity vulnerability that allows unauthenticated attackers to gain SYSTEM privileges on devices that use the Web development framework to run Linux or macOS apps.

The software maker said Tuesday evening that the vulnerability, tracked as CVE-2026-40372, affects versions 10.0.0 through 10.0.6 of the Microsoft.AspNetCore.DataProtection NuGet, a package that’s part of the framework. The critical flaw stems from a faulty verification of cryptographic signatures. It can be exploited to allow unauthenticated attackers to forge authentication payloads during the HMAC validation process, which is used to verify the integrity and authenticity of data exchanged between a client and a server.

Beware: Forged credentials survive patching

During the time users ran a vulnerable version of the package, they were left open to an attack that would allow unauthenticated people to gain sensitive SYSTEM privileges that would allow full compromise of the underlying machine. Even after the vulnerability is patched, devices may still be compromised if authentication credentials created by a threat actor aren’t purged.

Read full article

Comments

Kyber ransomware gang toys with post-quantum encryption on Windows

Bleeping Computer - 22 Duben, 2026 - 20:52
A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant implementing Kyber1024 post-quantum encryption. [...]
Kategorie: Hacking & Security

QEMU 11.0.0

AbcLinuxu [zprávičky] - 22 Duben, 2026 - 20:38
Byla vydána nová verze 11.0.0 otevřeného emulátoru procesorů a virtualizačního nástroje QEMU (Wikipedie). Přispělo 237 vývojářů. Provedeno bylo více než 2 500 commitů. Přehled úprav a nových vlastností v seznamu změn.
Kategorie: GNU/Linux & BSD
Syndikovat obsah