Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

Scheduled Pinned Locked Moved Uncategorized
73 Posts 38 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

    What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

    It's not though, is it?

    T This user is from outside of this forum
    T This user is from outside of this forum
    trademark@fosstodon.org
    wrote last edited by
    #20

    @GossiTheDog They aren't claiming it's over, that's a strawman. But interestingly they are providing commit hashes of things they've found. Some of these are seriously scary. I've saved a copy of the webpage and will be waiting to see if the promised commits turn up. If they do check out my opinion of Anthropic will rise. If not...

    dalias@hachyderm.ioD 1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      I don't think anybody actually watches videos any more, so here's MWT's core point -

      The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

      So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

      The proof is going to be if any of the open source vulns turn out to be important. So far:

      simonzerafa@infosec.exchangeS This user is from outside of this forum
      simonzerafa@infosec.exchangeS This user is from outside of this forum
      simonzerafa@infosec.exchange
      wrote last edited by
      #21

      @GossiTheDog

      Yes, we do watch videos! 🤔

      1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        I don't think anybody actually watches videos any more, so here's MWT's core point -

        The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

        So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

        The proof is going to be if any of the open source vulns turn out to be important. So far:

        david_chisnall@infosec.exchangeD This user is from outside of this forum
        david_chisnall@infosec.exchangeD This user is from outside of this forum
        david_chisnall@infosec.exchange
        wrote last edited by
        #22

        @GossiTheDog

        I asked the FreeBSD security officer to compare the (not yet public) one to Coverity reports. Apparently it found something that Coverity didn't, which means at least it isn't just regurgitating static analyser reports.

        That said, last time I read the Coverity reports, they found tens of thousands of possible issues (over 90% of the ones I triaged were false positives). You could probably get a higher RoI from paying someone $20K to triage Coverity scan reports.

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

          Link Preview Image
          codinghorror@infosec.exchangeC This user is from outside of this forum
          codinghorror@infosec.exchangeC This user is from outside of this forum
          codinghorror@infosec.exchange
          wrote last edited by
          #23

          @GossiTheDog @malwaretech Agree, and I will only add one thing: Misanthropic is an amoral cult.

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

            Link Preview Image
            cresssalad@mastodon.socialC This user is from outside of this forum
            cresssalad@mastodon.socialC This user is from outside of this forum
            cresssalad@mastodon.social
            wrote last edited by
            #24

            @GossiTheDog @malwaretech

            Yeah and solutions like this dont put servers in datacenters or work with threat analysis on transit traffic.

            If all its doing is improving point software solutions, then thats a good thing. Its not going to finish off SAAS solutions - its going to improve them.

            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              I don't think anybody actually watches videos any more, so here's MWT's core point -

              The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

              So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

              The proof is going to be if any of the open source vulns turn out to be important. So far:

              sikorsky78@infosec.exchangeS This user is from outside of this forum
              sikorsky78@infosec.exchangeS This user is from outside of this forum
              sikorsky78@infosec.exchange
              wrote last edited by
              #25

              @GossiTheDog Thanks for the summary, ain't got time for viewing videos.

              1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                Link Preview Image
                evoscale@c.imE This user is from outside of this forum
                evoscale@c.imE This user is from outside of this forum
                evoscale@c.im
                wrote last edited by
                #26

                @GossiTheDog @malwaretech Be wary of projecting special interests, couched in pure Capitalist profiting, too far among a valuable sector like CyberSec. It's a common pattern for a narrowing margin of the masses, to control more vital infrastructure, and heap residual abuses (thanks Capitalism) upon the far more innocent.

                1 Reply Last reply
                0
                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                  I don't think anybody actually watches videos any more, so here's MWT's core point -

                  The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                  So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                  The proof is going to be if any of the open source vulns turn out to be important. So far:

                  coffe@social.piewpiew.seC This user is from outside of this forum
                  coffe@social.piewpiew.seC This user is from outside of this forum
                  coffe@social.piewpiew.se
                  wrote last edited by
                  #27

                  @GossiTheDog I still do XD

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                    Link Preview Image
                    doragasu@mastodon.sdf.orgD This user is from outside of this forum
                    doragasu@mastodon.sdf.orgD This user is from outside of this forum
                    doragasu@mastodon.sdf.org
                    wrote last edited by
                    #28

                    @GossiTheDog @malwaretech Other researchers have replicated their try at finding security bugs with publicly available models and got same results. Is it better than earlier models? I suppose it is, it would be a big failure if a new bigger model wasn't. Is it the big leap they state. Doubtful.

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                      Link Preview Image
                      aristot73@infosec.exchangeA This user is from outside of this forum
                      aristot73@infosec.exchangeA This user is from outside of this forum
                      aristot73@infosec.exchange
                      wrote last edited by
                      #29

                      @GossiTheDog @malwaretech i found this post very relevant
                      https://mastodon.social/@CuratedHackerNews/116387186190988598

                      1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                        Link Preview Image
                        ralph@hear-me.socialR This user is from outside of this forum
                        ralph@hear-me.socialR This user is from outside of this forum
                        ralph@hear-me.social
                        wrote last edited by
                        #30

                        @GossiTheDog @malwaretech

                        #alttext

                        Marcus Hutchins
                        Malware, Threat Intelligence, Ex-Hacker
                        Since multiple people have asked me to comment on Claude Mythos / Glasswing, here it is: I can't possibly comment on something I haven't even seen, let alone used.
                        I, like everyone issuing hot takes, have absolutely no information to go off. We're all looking at the same marketing post with scant falsifiable data or testable hypotheses.
                        People need to stop clapping like a herd of trained seals every time a corporation drops a new press release. Why not wait for actual impartial data and empirical evidence, then evaluate accordingly?
                        Press Releases are designed to make a product look as good as possible (and in many cases much better than it actually is, see: Devin, GPT-5, Humane Al, Sora, etc). These are marketing publications not peer-reviewed articles in scientific journals.
                        We really, as an industry, need to start being more objective. I get that everyone is excited for Al, but we don't need 200,000 hot takes about how "cybersecurity is over" or "the world is ending" every time a new press release drops.
                        Marketing teams get paid lots of money to hype up new products. Why are you doing their work for free?

                        1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          I don't think anybody actually watches videos any more, so here's MWT's core point -

                          The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                          So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                          The proof is going to be if any of the open source vulns turn out to be important. So far:

                          j2kun@mathstodon.xyzJ This user is from outside of this forum
                          j2kun@mathstodon.xyzJ This user is from outside of this forum
                          j2kun@mathstodon.xyz
                          wrote last edited by
                          #31

                          @GossiTheDog IMO it's not nothing but not apocalypse. Enough for forward thinking groups to start taking it seriously and considering risks.

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                            What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                            It's not though, is it?

                            marius@kiessling.socialM This user is from outside of this forum
                            marius@kiessling.socialM This user is from outside of this forum
                            marius@kiessling.social
                            wrote last edited by
                            #32

                            @GossiTheDog Even *if* the word prediction box is now capable of findings vulns by throwing massive compute at the problem (leaving all the problems with this aside), you still need to get people to fix their shit. Like have they ever looked at what it takes to get a company to just patch their god damn network edge devices?

                            npars01@mstdn.socialN 1 Reply Last reply
                            0
                            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                              I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                              Link Preview Image
                              loadhigh@bitbang.socialL This user is from outside of this forum
                              loadhigh@bitbang.socialL This user is from outside of this forum
                              loadhigh@bitbang.social
                              wrote last edited by
                              #33

                              @GossiTheDog @malwaretech I, too, had my a-technical and very pro-A"I" colleague singing Mythos' praises. When I pointed out that we don't know how many false positives it also produced, it did dawn on him that it might not all that it seems

                              The thing is, is that he is in marketing, so he should know he's being fed a crafted story. But when it comes to this LLM-craze all critical thinking goed overboard, it seems.

                              I'm so worried about the future.

                              1 Reply Last reply
                              0
                              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                                Link Preview Image
                                samiamsam@mastodon.socialS This user is from outside of this forum
                                samiamsam@mastodon.socialS This user is from outside of this forum
                                samiamsam@mastodon.social
                                wrote last edited by
                                #34

                                @GossiTheDog @malwaretech

                                i keep thinking of the pet rock

                                and beanie babies

                                create buzz, create demand, get out early, everyone else is left with useless stuff cluttering their homes

                                controlfreak@todon.euC 1 Reply Last reply
                                0
                                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                  I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                                  Link Preview Image
                                  rhempel@cosocial.caR This user is from outside of this forum
                                  rhempel@cosocial.caR This user is from outside of this forum
                                  rhempel@cosocial.ca
                                  wrote last edited by
                                  #35

                                  @GossiTheDog @malwaretech Someday we will have a TV show called "Mythos Busters" where real cyber security experts debunk stuff like this ...

                                  1 Reply Last reply
                                  0
                                  • marius@kiessling.socialM marius@kiessling.social

                                    @GossiTheDog Even *if* the word prediction box is now capable of findings vulns by throwing massive compute at the problem (leaving all the problems with this aside), you still need to get people to fix their shit. Like have they ever looked at what it takes to get a company to just patch their god damn network edge devices?

                                    npars01@mstdn.socialN This user is from outside of this forum
                                    npars01@mstdn.socialN This user is from outside of this forum
                                    npars01@mstdn.social
                                    wrote last edited by
                                    #36

                                    @marius @GossiTheDog

                                    In my observation, organizations use these PR announcements & media releases to do layoffs, so they can outsource to a nephew's startup or grandchild's consultancy.

                                    And the necessary patches or policy changes never get implemented.

                                    marius@kiessling.socialM 1 Reply Last reply
                                    0
                                    • T trademark@fosstodon.org

                                      @GossiTheDog They aren't claiming it's over, that's a strawman. But interestingly they are providing commit hashes of things they've found. Some of these are seriously scary. I've saved a copy of the webpage and will be waiting to see if the promised commits turn up. If they do check out my opinion of Anthropic will rise. If not...

                                      dalias@hachyderm.ioD This user is from outside of this forum
                                      dalias@hachyderm.ioD This user is from outside of this forum
                                      dalias@hachyderm.io
                                      wrote last edited by
                                      #37

                                      @trademark @GossiTheDog What does "commit hashes of things they've found" even mean? No non-slop project is going to merge the same commits they used in their fixes, because they're LLM slop without provenance to license. If any of these are real, the upstream will fix the bug properly in a way the actual people working on the project understand and can document.

                                      azonenberg@ioc.exchangeA 1 Reply Last reply
                                      0
                                      • npars01@mstdn.socialN npars01@mstdn.social

                                        @marius @GossiTheDog

                                        In my observation, organizations use these PR announcements & media releases to do layoffs, so they can outsource to a nephew's startup or grandchild's consultancy.

                                        And the necessary patches or policy changes never get implemented.

                                        marius@kiessling.socialM This user is from outside of this forum
                                        marius@kiessling.socialM This user is from outside of this forum
                                        marius@kiessling.social
                                        wrote last edited by
                                        #38

                                        @Npars01 from experience, we can even leave out the nepotism and just trace it back to incompetence within the management team

                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                                          What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                                          It's not though, is it?

                                          nyanbinary@infosec.exchangeN This user is from outside of this forum
                                          nyanbinary@infosec.exchangeN This user is from outside of this forum
                                          nyanbinary@infosec.exchange
                                          wrote last edited by
                                          #39

                                          @GossiTheDog the thing I find the funniest is that their headline vulnerability in OpenBSD was closed as a reliability, not security issue & without a CVE, as far as I can tell?

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups