{"id":579482,"date":"2026-04-03T11:31:10","date_gmt":"2026-04-03T11:31:10","guid":{"rendered":"https:\/\/www.newsbeep.com\/ca\/579482\/"},"modified":"2026-04-03T11:31:10","modified_gmt":"2026-04-03T11:31:10","slug":"anthropics-next-model-could-be-a-watershed-moment-for-cybersecurity-experts-say-that-could-also-be-a-concern","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ca\/579482\/","title":{"rendered":"Anthropic\u2019s next model could be a \u2018watershed moment\u2019 for cybersecurity. Experts say that could also be a concern"},"content":{"rendered":"<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000i356q6ryxdzbf@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            The next wave of AI-powered cybersecurity attacks will be like nothing we\u2019ve seen before.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000j356q3ii1pwn7@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            That\u2019s the message AI company Anthropic sent in a leaked blog post last week, in which it warned that its upcoming AI model, called Mythos, and others like it can exploit vulnerabilities at an unprecedented pace.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni4436h001i356qp59q99ax@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            And it\u2019s not the only one: OpenAI <a href=\"https:\/\/openai.com\/index\/strengthening-cyber-resilience\/\" target=\"_blank\" rel=\"nofollow noopener\">warned<\/a> in December that its upcoming models posed a \u201chigh\u201d cybersecurity risk. Experts have already said AI can amplify existing dangers and rapidly generate new software hacks.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000k356qes1q0i8y@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            But the rise of AI agents, or AI assistants that can carry out tasks autonomously, takes that risk to another level, some experts warn. A single AI agent could scan for vulnerabilities and potentially take advantage of them faster and more persistently than hundreds of human hackers.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000l356qpdqv26kd@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            \u201cThe agentic attackers are coming,\u201d said Shlomo Kramer, founder and CEO of cybersecurity and networking company Cato Networks. \u201cThis is a watershed event in the history of cybersecurity.\u201d\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3wo5x001c356qrr6k0nuz@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            Details about Mythos leaked in an unpublished blog post first reported on by Fortune. Anthropic did not respond to CNN\u2019s request for comment. <a href=\"https:\/\/fortune.com\/2026\/03\/31\/anthropic-source-code-claude-code-data-leak-second-security-lapse-days-after-accidentally-revealing-mythos\/\" target=\"_blank\" rel=\"nofollow noopener\">But the company told Fortune<\/a> the leak was a result of human error within its content management system.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000n356qvg597iso@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            \u201cAlthough Mythos is currently far ahead of any other AI model in cyber capabilities, it presages an upcoming wave of models that can exploit vulnerabilities in ways that far outpace the efforts of defenders,\u201d <a href=\"https:\/\/m1astra-mythos.pages.dev\/\" target=\"_blank\" rel=\"nofollow noopener\">Anthropic said in the draft<\/a>.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000o356qz7l3mp6l@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            The company is letting certain organizations test the model ahead of time to improve their systems \u201cagainst the impending wave of AI-driven exploits,\u201d it said.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000p356ql67z2ffi@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            Anthropic is also privately warning government officials about the potential for large-scale cyberattacks enabled by Mythos, according to <a href=\"https:\/\/www.axios.com\/2026\/03\/29\/claude-mythos-anthropic-cyberattack-ai-agents\" target=\"_blank\" rel=\"nofollow noopener\">Axios<\/a>.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000q356qstxoo2fn@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            But every lab\u2019s next model will pose increasingly severe cybersecurity threats, Kramer told CNN.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000r356qm5lp7822@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            \u201cBehind Mythos is the next OpenAI model, and the next Google Gemini, and a few months behind them are the open-source Chinese models,\u201d he said.\n    <\/p>\n<p>       <img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/ca\/wp-content\/uploads\/2026\/04\/2026-03-22t015825z-653148237-rc289kauncb7-rtrmadp-3-usa-ai-protests.JPG\" alt=\"People march across San Francisco from Anthropic's headquarters to OpenAI to xAI, calling for a pause in AI development, in San Francisco on March 21, 2026.\" class=\"image_large__dam-img image_large__dam-img--loading\" onload=\"this.classList.remove('image_large__dam-img--loading')\" onerror=\"imageLoadError(this)\" height=\"3602\" width=\"5400\" loading=\"lazy\"\/><\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000s356qobapjru1@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            AI is making it possible to exploit vulnerabilities almost immediately after discovering them, said Evan Pe\u00f1a, chief offensive security officer at cybersecurity firm Armadin.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w494000t356qu1ytb0v9@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            But there are still limits to what the models can do, according to Pe\u00f1a.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w495000u356qikbfa8mk@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            Advanced AI models are good for researching software vulnerabilities and developing code to exploit them. But they lack the context a human hacker would have on what an organization\u2019s most valuable information to steal is, Pe\u00f1a said.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni4uxk4001q356qq30243pg@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            There will always be room for humans in a cyberattack using AI, said Joe Lin, said Joe Lin, co-founder and CEO of Twenty, a firm that sells offensive cyber capabilities to the US government.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni4t47a001o356q901gpy6h@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            \u201cWe must ensure we are building weapons systems where humans remain firmly in control of decisions and outcomes, because while the machine handles the execution, the human must always own the consequences,\u201d he said.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w495000w356qzl5pyj05@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            An example of how AI has made relatively unskilled hackers more dangerous came in January, when a Russian-speaking cybercriminal used multiple AI tools to hack over 600 devices running a popular firewall software in more than 55 countries, <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale\/\" target=\"_blank\" rel=\"nofollow noopener\">according<\/a> to Amazon Web Services\u2019 security research team. The hacker used generative AI services to \u201cimplement and scale well-known attack techniques throughout every phase of their operations, despite their limited technical capabilities,\u201d AWS <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale\/\" target=\"_blank\" rel=\"nofollow noopener\">said<\/a>.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w495000x356q9poztpy7@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            The hacker used Anthropic\u2019s Claude model as well as Chinese-made DeepSeek in the attack, according to Eyal Sela, director of threat intelligence at Gambit Security. At one point, the hacker asked Claude in Russian to create a web panel for managing hundreds of the hackers\u2019 targets, according to chat logs the hacker had with AI models that Sela shared with CNN.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w495000y356qxw3pggnu@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            AI gives hackers of varying skill \u201csuperpowers\u201d by simplifying the technical knowledge required to exploit systems, according to Sela.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w495000z356q7jw6uqxu@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            In February a hacker used Claude in a series of attacks against Mexican government agencies, stealing sensitive tax and voter information, <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-02-25\/hacker-used-anthropic-s-claude-to-steal-sensitive-mexican-data\" target=\"_blank\" rel=\"nofollow noopener\">Bloomberg<\/a> reported.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w4950010356qh4l31db3@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            China and other US adversaries are \u201chunting for any edge to improve the performance of their homegrown AI,\u201d said Joe Lin, co-founder and CEO of Twenty, a firm that sells offensive cyber capabilities to the US government.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w4950011356qh5l5onxd@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            That means potentially mining any leaks of US AI models to try to \u201csupercharge their own cyber weapons systems,\u201d he said.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w4950012356qbqbuu6fp@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            AI advancements in cybersecurity are a double-edged sword: Attackers can use AI models and agents to boost their abilities, while those same capabilities enable continuous monitoring, faster threat identification, and automated patching at a scale no human team could match.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w4950013356qtqa1oji8@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            But the attackers only need to find one way in, while defenders have to cover every surface. Kramer described it as building an \u201carmy of good guys\u201d to \u201cfight the army of bad guys\u201d just to hold the line.\n    <\/p>\n<p class=\"paragraph-elevate inline-placeholder vossi-paragraph_elevate\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/cmni3w4950014356q0lfo55o4@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\">\n            \u201cYou need to run as fast as you can in order to stay in the same place,\u201d he said.\n    <\/p>\n","protected":false},"excerpt":{"rendered":"The next wave of AI-powered cybersecurity attacks will be like nothing we\u2019ve seen before. That\u2019s the message AI&hellip;\n","protected":false},"author":2,"featured_media":579483,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[62,276,277,49,48,61],"class_list":{"0":"post-579482","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-ca","12":"tag-canada","13":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/579482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/comments?post=579482"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/579482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media\/579483"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media?parent=579482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/categories?post=579482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/tags?post=579482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}