{"id":8178,"date":"2026-04-20T10:52:10","date_gmt":"2026-04-20T10:52:10","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/8178\/"},"modified":"2026-04-20T10:52:10","modified_gmt":"2026-04-20T10:52:10","slug":"mythos-as-hacking-tool-fuels-company-anxiety-over-cyber-defense","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/8178\/","title":{"rendered":"Mythos as Hacking Tool Fuels Company Anxiety Over Cyber Defense"},"content":{"rendered":"<p>The buzz around AI model Mythos and its power to outsmart cybersecurity defenses is alarming companies and vendors already struggling to fend off existing threats.<\/p>\n<p>The slow-walked <a data-terminal-id=\"TDLGAJKGCTJK\" href=\"https:\/\/news.bloomberglaw.com\/artificial-intelligence\/inside-anthropics-race-to-assess-the-dangers-of-mythos\" rel=\"nofollow noopener\" target=\"_blank\">release of Mythos<\/a> from Anthropic PBC\u2014combined with OpenAI\u2019s new model that can quickly spot software vulnerabilities\u2014risks disrupting how cybersecurity firms operate and how companies approach their defensive capabilities. <\/p>\n<p>Together, their promised capabilities threaten businesses that are operating with tight cyber budgets, exposed weaknesses, and AI-enabled defenses already lagging behind attackers\u2019 capabilities. Even before Mythos, companies were battling increasingly sophisticated AI-powered phishing and <a data-terminal-id=\"TCEBOMKGZAIU\" href=\"https:\/\/news.bloomberglaw.com\/artificial-intelligence\/deepfakes-grow-more-sophisticated-putting-companies-on-alert\" rel=\"nofollow noopener\" target=\"_blank\">deepfake campaigns<\/a>.<\/p>\n<p>\u201cHopefully this whole announcement has made others think about how to use AI and to use it starting now,\u201d said Ellen Boehm, senior vice president of strategy and AI innovation at Keyfactor, a digital security company. \u201cIf we don\u2019t use it, the attackers will,\u201d she said. Boehm added that defenders need to get better at using such tools to bolster security teams, \u201cbecause that is what\u2019s being used to attack us.\u201d<\/p>\n<p>Still, little is known about these models and it\u2019s challenging to separate hype from reality. Anthropic only offered access to a select group of vetted companies over concerns the tool may end up in the wrong hands. Top <a data-terminal-id=\"TDG0CVT96OSJ\" href=\"https:\/\/news.bloomberglaw.com\/artificial-intelligence\/us-treasury-seeking-access-to-anthropics-mythos-to-find-flaws\" rel=\"nofollow noopener\" target=\"_blank\">Trump officials quickly summoned Wall Street<\/a> leaders to urge them to prepare for the new types of cyber threats ahead.<\/p>\n<p>Anthropic described Mythos\u2019s capabilities in an online post, saying that engineers with no formal security training asked the model to find vulnerabilities in a remote system and woke up the next day to find a complete toolkit to break into it. <\/p>\n<p>The arrival of these new models means the cybersecurity industry is entering a profound transition period and so are their customers, said Jen Easterly, former director of the Cybersecurity and Infrastructure Security Agency. Models like Mythos make it much harder for boards and CEOs to think that AI strategy and cyber strategy are separate conversations, she said.<\/p>\n<p>\u201cCyber and AI are inextricably linked,\u201d Easterly said. \u201cYou can\u2019t have effective cyber capabilities without AI, and you can\u2019t have AI be the engine of innovation and economic prosperity and national security unless these capabilities are built and designed to be secure.\u201d<\/p>\n<p>Need for Speed<\/p>\n<p>Defenders need to deploy AI-enabled cyber defenses just as quickly as attackers leverage the new capabilities. <\/p>\n<p>Mythos is \u201ca good example of the kind of tool that defenders have to adopt as quickly as possible,\u201d said Justin Herring, partner at Mayer Brown and former cyber official at the New York Department of Financial Services. \u201cI know they\u2019re limiting the circulation of this, which is probably a good thing. But you don\u2019t want to be the organization that falls behind when you\u2019re dealing with attackers that can exploit the fact that you\u2019ve fallen behind at scale and at speed.\u201d<\/p>\n<p>About 85% of senior security leaders using AI in cybersecurity say their current cyber budget is insufficient to meet AI-enabled threats, according to a <a href=\"https:\/\/www.ey.com\/en_us\/newsroom\/2026\/03\/cybersecurity-leaders-investing-in-ai-and-agentic-defenses-to-combat-escalating-ai-enabled-threats\" rel=\"nofollow noopener\" target=\"_blank\">March 2026 EY<\/a> survey. Only about 9% of cyber executives say they\u2019re dedicating at least 25% of their cybersecurity budget to AI solutions.<\/p>\n<p>\u201cWhat will it do to cyber budgets? My guess is it\u2019s going to make them go up because people are going to think about, \u2018What do I need to buy, deploy, and invest in order to deal with this new threat vector?\u2019\u201d said Andrew Rubin, founder of Illumio, a cybersecurity company.<\/p>\n<p>Weak Links<\/p>\n<p>AI\u2019s potential to spot gaps in software would still leave cyber teams with the same challenges they\u2019ve been facing for the last few years: fix weaknesses as quickly as possible. <\/p>\n<p>\u201cEven if Mythos is able to find and suggest patches, it requires the entity who\u2019s been notified to then deploy those responsibly,\u201d said Chinmayi Sharma, associate professor at Fordham Law School focusing her research on cyber and AI. \u201cI\u2019m not saying that there\u2019s rampant disregard for security, but it\u2019s pretty non-controversial to say that in the public and private sector there just hasn\u2019t been the attention towards security that many would want.\u201d <\/p>\n<p>As the latest models compress the time it takes to infiltrate defenses, teams will have to shift away from periodic testing or patching. <\/p>\n<p>Most importantly, companies have to \u201ccontinually invest in cybersecurity,\u201d Morgan Adamski, US cyber, data, and tech risk leader at PwC, said during an April press briefing. \u201cCybersecurity is going to be critical for companies to invest in over the next couple years, especially with what\u2019s coming from an AI perspective and how adversaries are already leveraging it to gain access to networks at a scope and speed that is very difficult to keep up with.\u201d<\/p>\n<p>A New Era <\/p>\n<p>The new models could also scramble how cybersecurity vendors operate.<\/p>\n<p>\u201cIt\u2019s a threat to firms whose business model really depends on scarcity and manual labor and slow assessments,\u201d Easterly, now a CEO with RSAC, said. \u201cBut it\u2019s a major opportunity for companies that can help customers operationalize AI at defender speed.\u201d<\/p>\n<p>As vendors pivot to adapt to companies\u2019 needs, chief information security officers (or CISOs) will be tasked with finding the right investments.<\/p>\n<p>\u201cIt\u2019s very, very important for CISOs and leaders responsible for governance to stay on top of these developments and to incorporate these tools as rapidly as they become available on the defensive side,\u201d Mayer Brown\u2019s Herring said. <\/p>\n<p>Internally, CISOs are also pulled in different directions as they attempt to keep track of business units\u2019 own use of AI\u2014whether it\u2019s a financial officer or human resources representative that wants to use new AI tools for their own business needs, said Geoff Hancock, chief information security officer &amp; CEO at PurpleSec, a cyber company. <\/p>\n<p>There are other ways CISOs will have to prepare because breaches are now inevitable, Rubin of Illumio said.<\/p>\n<p>\u201cYou better prioritize resilience,\u201d he said, \u201cbecause recovering from one is going to be as or more important than preventing all of them, which we\u2019ve clearly proven we cannot do.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"The buzz around AI model Mythos and its power to outsmart cybersecurity defenses is alarming companies and vendors&hellip;\n","protected":false},"author":2,"featured_media":8179,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[24,25,7146,7147,1642,1896,5990],"class_list":{"0":"post-8178","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ai","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-corporate-officers","11":"tag-infrastructure-security","12":"tag-large-language-models","13":"tag-national-security","14":"tag-phishing"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/8178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=8178"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/8178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/8179"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=8178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=8178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=8178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}