{"id":49196,"date":"2026-04-13T04:44:17","date_gmt":"2026-04-13T04:44:17","guid":{"rendered":"https:\/\/foreignnewstoday.com\/?p=49196"},"modified":"2026-04-13T04:44:17","modified_gmt":"2026-04-13T04:44:17","slug":"ai-is-raising-the-stakes-for-cyber-professionals-claude-mythos-just-took-things-to-another-level","status":"publish","type":"post","link":"https:\/\/foreignnewstoday.com\/?p=49196","title":{"rendered":"AI is raising the stakes for cyber professionals \u2013 Claude Mythos just took things to another level"},"content":{"rendered":"<p><br \/>\n<br \/><\/p>\n<div id=\"article-body\">\n<p id=\"elk-39babba5-bd0b-4a64-9387-c493f5e21731\">Anthropic\u2019s Project Glasswing announcement this week is one of the \u201cclearest signals yet\u201d that there\u2019s a looming AI arms race in the cybersecurity profession, according to industry experts.<\/p>\n<p id=\"elk-8928597f-b3a8-49e6-8242-05d3ba83155b\">The AI company announced a new initiative that will see a host of big tech companies, including Microsoft, Amazon, Palo Alto Networks, and CrowdStrike, test its new Claude Mythos model behind closed doors.<\/p>\n<p><a id=\"elk-seasonal\"\/><\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-root\"\/>\n<p id=\"elk-10a3db80-3308-435b-88bf-ef4e9859ddc4-0\">Anthropic said the model has the potential to \u201creshape cybersecurity\u201d and made a conscious decision to limit the release to industry stakeholders to prevent potential misuse.<\/p>\n<p id=\"elk-8b533904-f02f-4d28-820b-a8f55f814e88\">As <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/technology\/artificial-intelligence\/project-glasswing-anthropic-announces-big-tech-consortium-to-test-claude-mythos-ai-model-that-could-reshape-cybersecurity\" data-url=\"https:\/\/www.itpro.com\/technology\/artificial-intelligence\/project-glasswing-anthropic-announces-big-tech-consortium-to-test-claude-mythos-ai-model-that-could-reshape-cybersecurity\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/technology\/artificial-intelligence\/project-glasswing-anthropic-announces-big-tech-consortium-to-test-claude-mythos-ai-model-that-could-reshape-cybersecurity\"><em>ITPro <\/em>noted earlier this week<\/a>, it\u2019s <em>very unusual <\/em>for a company to announce a gated release of an AI model, especially given the rapid-fire release timelines we\u2019ve seen over the last three years.<\/p>\n<p id=\"elk-056f297b-7415-4e49-ac10-9b1e8e9821d5\">Companies such as OpenAI, Anthropic, and Google have been locked in a game of one-upmanship to roll out increasingly powerful models and gain a cutting edge on competitors.<\/p>\n<p id=\"elk-701669ba-a2d6-42b6-b0c7-47708ce105bb\">Anthropic\u2019s main rival, OpenAI, is now also reportedly considering a similar gated release format for an upcoming cybersecurity tool, per reports from <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.axios.com\/2026\/04\/09\/openai-new-model-cyber-mythos-anthopic\" target=\"_blank\" data-url=\"https:\/\/www.axios.com\/2026\/04\/09\/openai-new-model-cyber-mythos-anthopic\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>Axios<\/em><\/a>.<\/p>\n<p>If OpenAI follows suit, it means two of the leading AI model developers are actively concerned about the potential for misuse, and that doesn&#8217;t bode well for cyber teams.<\/p>\n<div id=\"slice-container-newsletterForm-articleInbodyContent-dBWcYZ5aLKUG9LP9zn3Zb4\" class=\"slice-container newsletter-inbodyContent-slice newsletterForm-articleInbodyContent-dBWcYZ5aLKUG9LP9zn3Zb4 slice-container-newsletterForm\">\n<div data-hydrate=\"true\" class=\"newsletter-form__wrapper newsletter-form__wrapper--inbodyContent\">\n<div class=\"newsletter-form__container\">\n<section class=\"newsletter-form__top-bar\"\/>\n<section class=\"newsletter-form__main-section\">\n<p class=\"newsletter-form__strapline\">Sign up today and you will receive a free copy of our Future Focus 2025 report &#8211; the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives<\/p>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p><a id=\"elk-d6a5eb4c-2690-4805-984c-53b31cf51686\"\/><\/p>\n<h2 id=\"the-double-edged-sword-of-ai-3\">The double edged sword of AI<\/h2>\n<p id=\"elk-0fdc21aa-a280-4120-8c6f-144b0a63b1df\">Bharat Mistry, field CTO at TrendAI, part of Trend Micro, said the initiative shows AI has now reached a critical tipping point in terms of its applications in cybersecurity.<\/p>\n<p id=\"elk-b1d6b6e7-63a7-4851-b143-9f346a2469c1\">\u201cFrontier models can now uncover decades-old vulnerabilities at a scale and speed that only a handful of top security experts could previously match,\u201d he said.<\/p>\n<p id=\"elk-714f8c79-eebf-4882-8a58-2950cd3b28bb\">AI-driven gains work both ways, however. Ilkka Turunen, Field CTO at Sonatype, echoed Mistry\u2019s comments, but warned the technology is opening the door to an array of new AI-powered threats and potential risks.<\/p>\n<p id=\"elk-2eef85e8-c070-492c-8e7d-af88e83a71f5\">\u201cTimelines to exploitation will continue to compress, new vulnerabilities will be discovered and spread faster, and attacks will continue to be completely autonomous,\u201d Turunen noted.<\/p>\n<p id=\"elk-32de20d5-a10e-49b7-a535-9cb5eaac6f13\">\u201cWe are already seeing this occur with current gen models, for example with the attack chain of supply chain incidents that TeamPCP has been exploiting, which led to the <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/litellm-pypi-compromise-everything-we-know-so-far\" data-url=\"https:\/\/www.itpro.com\/security\/litellm-pypi-compromise-everything-we-know-so-far\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/litellm-pypi-compromise-everything-we-know-so-far\">compromise of LiteLLM<\/a>.\u201d<\/p>\n<p id=\"elk-75ddb8ad-90af-4f51-8939-f16c5fd1b681\">\u201cFor defenders, it means that we have to accept a rapid, autonomous future where our reaction times need to continue to compress, our ability to ship secure code needs to speed up.\u201d<\/p>\n<p id=\"elk-692a4786-6ff5-4b9e-ad43-b1d9bdad40f0\">AI is now very much a double-edged sword for security practitioners, and the warning signs have been there for some time.<\/p>\n<p id=\"elk-9c845bea-56af-4e74-abfd-ce605e42d40a\">Fortinet\u2019s 2025 <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/reports\/2025-cybersecurity-skills-gap-report.pdf\" target=\"_blank\" data-url=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/reports\/2025-cybersecurity-skills-gap-report.pdf\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u><em>Cybersecurity Skills Gap<\/em><\/u><\/a> report, for example, found that 49% of cyber leaders are worried AI will increase the sophistication &#8211; and crucially, the volume &#8211; of cyber attacks.<\/p>\n<p id=\"elk-244653e5-9af4-4227-91cc-fe801a47803d\">Crucially, threat actors have been observed using the technology to <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware\" data-url=\"https:\/\/www.itpro.com\/security\/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware\">reverse engineer malware <\/a>and create more <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.itpro.com\/security\/phishing\/ai-generated-phishing-became-the-baseline-for-hackers-last-year-kaseya-warns-its-going-to-get-worse-in-2026\" data-url=\"https:\/\/www.itpro.com\/security\/phishing\/ai-generated-phishing-became-the-baseline-for-hackers-last-year-kaseya-warns-its-going-to-get-worse-in-2026\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\" data-before-rewrite-localise=\"https:\/\/www.itpro.com\/security\/phishing\/ai-generated-phishing-became-the-baseline-for-hackers-last-year-kaseya-warns-its-going-to-get-worse-in-2026\">convincing phishing lures<\/a>.<\/p>\n<p><a id=\"elk-ec08e90c-c112-409a-8f80-38f727d16ee6\"\/><\/p>\n<h2 id=\"increased-velocity-3\">Increased velocity<\/h2>\n<p id=\"elk-9d7bff56-eb47-4465-895a-32bd895d12fc\">Liam Salsi, director of architecture at Talion, noted that while the Claude Mythos initiative does have long-term implications for enterprises, it\u2019s not quite the existential threat many are suggesting.<\/p>\n<p id=\"elk-089d5e1b-68f9-4b7f-a054-f848486c2037\">\u201cIt&#8217;s also important to note that this does not render existing security controls obsolete,\u201d he said.<\/p>\n<p id=\"elk-cbf7d30c-77b8-42d5-a887-eb23117088a1\">\u201cMany of the vulnerabilities identified through programmes like Glasswing would still be detectable and preventable through layered security approaches and mature SOC capabilities.\u201d<\/p>\n<p id=\"elk-c8d93a01-fb85-4f19-ba46-32d24fd424f5\">What this does showcase, however, is that the scale is changing. Security teams are now working at machine speed &#8211; and many are unprepared to cope with increased velocity.<\/p>\n<p id=\"elk-812dd5d3-86c3-41f5-b14b-21dd262f7f89\">Last year, the UK\u2019s National Cyber Security Centre (NCSC) <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.ncsc.gov.uk\/report\/impact-ai-cyber-threat-now-2027\" target=\"_blank\" data-url=\"https:\/\/www.ncsc.gov.uk\/report\/impact-ai-cyber-threat-now-2027\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><u>warned <\/u><\/a>that AI tools will \u201calmost certainly\u201d enhance threat actors\u2019 ability to exploit vulnerabilities at a rapid pace.<\/p>\n<p id=\"elk-d1b2034d-5cd7-44f0-aafd-f24b2ccc595f\">\u201cAI will increase the speed and volume at which vulnerabilities are discovered and potentially exploited, placing greater pressure on organizations to respond at pace,\u201d he commented.<\/p>\n<p id=\"elk-5a3b79c5-7ee3-4197-a220-5ae7bc363e5d\">\u201cThe ability to scale detection and response will become a defining factor in how effectively organizations can manage this next phase of cyber risk.\u201d<\/p>\n<p><a id=\"elk-follow-us-on-social-media\"\/><\/p>\n<h3 class=\"article-body__section\" id=\"section-follow-us-on-social-media\"><span>FOLLOW US ON SOCIAL MEDIA<\/span><\/h3>\n<p id=\"elk-74cf6fab-bed1-4c3c-8a22-ee516b8ed142\"><a data-analytics-id=\"inline-link\" href=\"https:\/\/news.google.com\/publications\/CAAqIggKIhxDQklTRHdnTWFnc0tDV2wwY0hKdkxtTnZiU2dBUAE?ceid=GB:en&amp;oc=3&amp;hl=en-GB&amp;gl=GB\" data-url=\"https:\/\/news.google.com\/publications\/CAAqIggKIhxDQklTRHdnTWFnc0tDV2wwY0hKdkxtTnZiU2dBUAE?ceid=GB:en&amp;oc=3&amp;hl=en-GB&amp;gl=GB\" target=\"_blank\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>Follow ITPro on Google News<\/em><\/a><em> and <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.google.com\/preferences\/source?q=itpro.com\" data-url=\"https:\/\/www.google.com\/preferences\/source?q=itpro.com\" target=\"_blank\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>add us as a preferred source<\/em><\/a><em> to keep tabs on all our latest news, analysis, views, and reviews.<\/em><\/p>\n<p><em>You can also <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.linkedin.com\/company\/itpro-uk\" target=\"_blank\" data-url=\"https:\/\/www.linkedin.com\/company\/itpro-uk\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>follow ITPro on LinkedIn<\/em><\/a><em>, <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/x.com\/ITPro\" target=\"_blank\" data-url=\"https:\/\/x.com\/ITPro\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>X<\/em><\/a><em>, <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.facebook.com\/ITProUK\/\" target=\"_blank\" data-url=\"https:\/\/www.facebook.com\/ITProUK\/\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>Facebook<\/em><\/a><em>, and <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/bsky.app\/profile\/itpro.com\" target=\"_blank\" data-url=\"https:\/\/bsky.app\/profile\/itpro.com\" referrerpolicy=\"no-referrer-when-downgrade\" data-hl-processed=\"none\" data-mrf-recirculation=\"inline-link\"><em>BlueSky<\/em><\/a><em>.<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.itpro.com\/security\/ai-is-raising-the-stakes-for-cyber-professionals-claude-mythos-just-took-things-to-another-level\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anthropic\u2019s Project Glasswing announcement this week is one of the \u201cclearest signals yet\u201d that there\u2019s a looming AI arms race in the cybersecurity profession, according to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":49197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[32],"tags":[],"class_list":["post-49196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/posts\/49196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=49196"}],"version-history":[{"count":0,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/posts\/49196\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=\/wp\/v2\/media\/49197"}],"wp:attachment":[{"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=49196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=49196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/foreignnewstoday.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=49196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}