{"id":1995,"date":"2026-04-09T21:15:32","date_gmt":"2026-04-09T21:15:32","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/1995\/"},"modified":"2026-04-09T21:15:32","modified_gmt":"2026-04-09T21:15:32","slug":"is-anthropics-claude-mythos-an-ai-nightmare-waiting-to-happen","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/1995\/","title":{"rendered":"Is Anthropic&#8217;s Claude Mythos an AI nightmare waiting to happen?"},"content":{"rendered":"<p>   00:00     Speaker A <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">Final story of the day, Anthropic. So, we were talking about project Glasswing uh yesterday or the day before and that&#8217;s where their Claude model is so powerful. It&#8217;s going through all this code of existing code, like operating systems and big world-class enterprise systems. It&#8217;s finding all kinds of bugs. And so they were not releasing their Claude Mythos. I&#8217;m not sure if I&#8217;m pronouncing it Mythos. <\/p>\n<p>   00:27     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">I think it&#8217;s Mythos. <\/p>\n<p>   00:27     Speaker A <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">All right. They did not uh release that to the public because it was so good at finding these bugs and you know, there&#8217;s a whole big market out there on the black market for zero day vulnerabilities, et cetera. So tell us what we&#8217;re what we&#8217;re learning here. <\/p>\n<p>   00:41     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">Yeah, I mean, this is just kind of a a scary look into where we&#8217;re headed when it comes to AI. and basically, you know, as you said, this this mythos was able to go in, find bugs that are 26 years old that, you know, <\/p>\n<p>   00:58     Speaker A <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">Everybody missed, but now, now suddenly they&#8217;re <\/p>\n<p>   01:00     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">Software that&#8217;s around for 26 years. And it&#8217;s not as though you just release software and you&#8217;re like, oh, that&#8217;s it, you know, people are constantly trying to, you know, find bugs, patch them and despite all of that over the years, this was able to go through and say, oh, found it. And it it was able to uh find other exploits throughout all the operating systems out there as well as all the web browsers out there. This was not trained for cyber attacks. This was a general purpose model. <\/p>\n<p>   01:29     Speaker A <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">Just emerged. <\/p>\n<p>   01:29     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">It&#8217;s yes, they just said, oh no, that&#8217;s not great. So they are kind of only releasing it to their partners and saying, look, uh you guys use this to find bugs, fix them before other big models like this come out. And you know, eventually we may see a a stripped down version hit the market, but you know, I was speaking to experts even before Mythos was announced and their takeaway was, look, you know, there&#8217;s a number of issues that AI uh introduces to cybersecurity. There&#8217;s the ability like we&#8217;ve we&#8217;re seeing here with Mythos that it can scan for vulnerabilities much faster than hackers and then they can just implement that. <\/p>\n<p>   02:08     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">The flip side is everybody&#8217;s moving a lot faster, so that also adds vulnerabilities. <\/p>\n<p>   02:16     Speaker A <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">Yes. <\/p>\n<p>   02:16     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">It&#8217;s not just regular folks though. Attackers are also moving a lot faster. Uh there was one uh there was the uh uh project Light LLM. Uh and uh that ended up uh part of a supply chain attack on Mercor. The reason why that was found was a security researcher, uh their computer crashed when it when uh they accidentally downloaded this this uh uh malware and they looked at it and they said, oh, this was vibe coded. So somebody just made a piece of malware using <\/p>\n<p>   02:49     Speaker A <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">that was vibe coded which had additional errors inside it. Okay, that&#8217;s great. <\/p>\n<p>   02:54     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">And so that&#8217;s that&#8217;s where they caught it. Yeah. And so this is going to be, think about how, you know, malware already. Exactly. But it&#8217;s now it&#8217;s like everybody&#8217;s drinking too much Red Bull or whatever or Celsius, I guess if you&#8217;re Brian Sozzi and it now it&#8217;s just going to be so much faster and hitting so much quicker. And so it&#8217;s up to companies like, you know, uh Anthropic, Open AI, Microsoft is big in the space, obviously, then the big the big uh companies uh CrowdStrike, uh Palo Alto Network to be on top of this and include AI in their own offerings as part of the defense mechanism. <\/p>\n<p>   03:42     Speaker B <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">It&#8217;s not this isn&#8217;t something that I think we&#8217;re just going to be able to outsource to software. You need people involved as well to be able to say, okay, we need to do this, we should be watching this. <\/p>\n<p>   03:51     Speaker A <\/p>\n<p data-testid=\"typography\" class=\" type-body-md-reg    yf-gjjls9\">And it&#8217;s already hitting Palo Alto stock and a number of others in the cybersecurity space. <\/p>\n","protected":false},"excerpt":{"rendered":"00:00 Speaker A Final story of the day, Anthropic. So, we were talking about project Glasswing uh yesterday&hellip;\n","protected":false},"author":2,"featured_media":1996,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[24,25,2213,2214,2209],"class_list":{"0":"post-1995","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ai","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-claude-mythos","11":"tag-claude-mythos-ai-model","12":"tag-dan-howley"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/1995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=1995"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/1995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/1996"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=1995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=1995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=1995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}