<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Let&#x27;s review the last couple of weeks in #AI land...]]></title><description><![CDATA[<p>Let's review the last couple of weeks in <a href="https://infosec.exchange/tags/AI" rel="tag">#<span>AI</span></a> land...</p><ul><li>2026-04-07 - <a href="https://infosec.exchange/tags/Anthropic" rel="tag">#<span>Anthropic</span></a> announces <a href="https://infosec.exchange/tags/Claude" rel="tag">#<span>Claude</span></a> <a href="https://infosec.exchange/tags/Mythos" rel="tag">#<span>Mythos</span></a> Preview, but it's too dangerous to release. They establish <a href="https://infosec.exchange/tags/ProjectGlasswing" rel="tag">#<span>ProjectGlasswing</span></a> as a coalition to test the model ahead of public release.</li><li>2026-04-08 - The <a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> industry goes ape shit! </li><li>2026-04-13 - Cloud Security Alliance (CSA) CISO Community publshes their “Building a ‘Mythos- ready’ Security Program” paper.</li><li>2026-04-13 - Davi Ottenheimer publishes a "teardown" of Claude Mythos Preview's system card, revealing Mythos is an epic fail. This blog post is starting to pick up steam.</li><li>2026-04-14 - <a href="https://infosec.exchange/tags/OpenAI" rel="tag">#<span>OpenAI</span></a> announces their AI is dangerous, too! GPT-5.4-Cyber released.</li><li>2026-04-21 - A Discord group announces they've had access to the Mythos model for two weeks.</li><li>2026-04-22 - Chinese Firm Claims AI-Driven Bug Discovery Near Claude Mythos Scale</li></ul><p>What a joke. It's just a matter of time that this whole industry just craters...</p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/448/870/528/621/219/original/fb06999379d1a252.jpg" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/f66b2efc-0b28-4401-a90f-803e72aaa58c/let-s-review-the-last-couple-of-weeks-in-ai-land...</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:22:34 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/f66b2efc-0b28-4401-a90f-803e72aaa58c.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 22 Apr 2026 14:39:22 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Let&#x27;s review the last couple of weeks in #AI land... on Wed, 22 Apr 2026 14:43:25 GMT]]></title><description><![CDATA[<p><span><a href="/user/cr0w%40infosec.exchange">@<span>cR0w</span></a></span> Yes! Added.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/scottwilson/statuses/116448887157734852</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/scottwilson/statuses/116448887157734852</guid><dc:creator><![CDATA[scottwilson@infosec.exchange]]></dc:creator><pubDate>Wed, 22 Apr 2026 14:43:25 GMT</pubDate></item><item><title><![CDATA[Reply to Let&#x27;s review the last couple of weeks in #AI land... on Wed, 22 Apr 2026 14:43:13 GMT]]></title><description><![CDATA[<p>References, in case you're interested...</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">

<div class="card-body">
<h5 class="card-title">
<a href="https://www.nytimes.com/2026/04/07/technology/anthropic-claims-its-new-ai-model-mythos-is-a-cybersecurity-reckoning.html">
nytimes.com
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://www.nytimes.com/2026/04/07/technology/anthropic-claims-its-new-ai-model-mythos-is-a-cybersecurity-reckoning.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.nytimes.com/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.nytimes.com)</span></p>
</a>
</div><p></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://labs.cloudsecurityalliance.org/research/ai-vulnerability-storm-mythos-ready-security-program/" title="The “AI Vulnerability Storm”: Building a “Mythos-ready” Security Program">
<img src="https://i0.wp.com/labs.cloudsecurityalliance.org/wp-content/uploads/2025/12/cropped-logo.png?fit=512%2C512&amp;ssl=1" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://labs.cloudsecurityalliance.org/research/ai-vulnerability-storm-mythos-ready-security-program/">
The “AI Vulnerability Storm”: Building a “Mythos-ready” Security Program
</a>
</h5>
<p class="card-text line-clamp-3">Expedited strategy briefing by the CSA CISO Community, SANS, [un]prompted, and the OWASP Gen AI Security Project on building security programs ready for the AI vulnerability discovery era.</p>
</div>
<a href="https://labs.cloudsecurityalliance.org/research/ai-vulnerability-storm-mythos-ready-security-program/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://i0.wp.com/labs.cloudsecurityalliance.org/wp-content/uploads/2025/12/cropped-logo.png?fit=32%2C32&amp;ssl=1" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />







<p class="d-inline-block text-truncate mb-0">Lab Space <span class="text-secondary">(labs.cloudsecurityalliance.org)</span></p>
</a>
</div><p></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.theverge.com/ai-artificial-intelligence/916501/anthropic-mythos-unauthorized-users-access-security" title="Anthropic’s most dangerous AI model just fell into the wrong hands">
<img src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/25469782/STK269_ANTHROPIC_D.jpg?quality=90&amp;strip=all&amp;crop=0%2C10.732984293194%2C100%2C78.534031413613&amp;w=1200" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.theverge.com/ai-artificial-intelligence/916501/anthropic-mythos-unauthorized-users-access-security">
Anthropic’s most dangerous AI model just fell into the wrong hands
</a>
</h5>
<p class="card-text line-clamp-3">Anthropic’s powerful Mythos cybersecurity AI model has been accessed by a “small group of unauthorised users.”</p>
</div>
<a href="https://www.theverge.com/ai-artificial-intelligence/916501/anthropic-mythos-unauthorized-users-access-security" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.theverge.com/static-assets/icons/favicon-32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />















<p class="d-inline-block text-truncate mb-0">The Verge <span class="text-secondary">(www.theverge.com)</span></p>
</a>
</div><p></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.flyingpenguin.com/the-boy-that-cried-mythos-verification-is-collapsing-trust-in-anthropic/" title="The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin">
<img src="https://www.flyingpenguin.com/wp-content/uploads/2026/05/flyingpenguin-header-bubbles.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>















<div class="card-body">
<h5 class="card-title">
<a href="https://www.flyingpenguin.com/the-boy-that-cried-mythos-verification-is-collapsing-trust-in-anthropic/">
The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin
</a>
</h5>
<p class="card-text line-clamp-3"></p>
</div>
<a href="https://www.flyingpenguin.com/the-boy-that-cried-mythos-verification-is-collapsing-trust-in-anthropic/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.flyingpenguin.com/wp-content/uploads/2024/03/cropped-favico-32x32.jpg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />







<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.flyingpenguin.com)</span></p>
</a>
</div><p></p><p><a href="https://www.wired.com/story/in-the-wake-of-anthropics-mythos-openai-has-a-new-cybersecurity-model-and-strategy/'" rel="nofollow noopener"><span>https://www.</span><span>wired.com/story/in-the-wake-of</span><span>-anthropics-mythos-openai-has-a-new-cybersecurity-model-and-strategy/'</span></a>'</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability" title="Chinese Firm Claims AI-Driven Bug Discovery Near Claude Mythos Scale">
<img src="https://substackcdn.com/image/fetch/$s_!TRDG!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3e4f5-c84e-44fd-bace-cf37376dd738_660x377.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability">
Chinese Firm Claims AI-Driven Bug Discovery Near Claude Mythos Scale
</a>
</h5>
<p class="card-text line-clamp-3">Chinese companies could match the capabilities attributed to Claude Mythos within months, according to industry experts, reinforcing existing cyber offense asymmetries</p>
</div>
<a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://substackcdn.com/image/fetch/$s_!n8eN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36112c11-055e-46ca-9d1c-dc2be6bd49cb%2Ffavicon-16x16.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />































<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.nattothoughts.com)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/scottwilson/statuses/116448886340254665</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/scottwilson/statuses/116448886340254665</guid><dc:creator><![CDATA[scottwilson@infosec.exchange]]></dc:creator><pubDate>Wed, 22 Apr 2026 14:43:13 GMT</pubDate></item><item><title><![CDATA[Reply to Let&#x27;s review the last couple of weeks in #AI land... on Wed, 22 Apr 2026 14:42:48 GMT]]></title><description><![CDATA[<p><span><a href="/user/scottwilson%40infosec.exchange">@<span>scottwilson</span></a></span> </p><p><a href="https://mastodon.world/tags/AIhype" rel="tag">#<span>AIhype</span></a> <a href="https://mastodon.world/tags/AIbubble" rel="tag">#<span>AIbubble</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.world/users/Captain_Jack_Sparrow/statuses/116448884689925894</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.world/users/Captain_Jack_Sparrow/statuses/116448884689925894</guid><dc:creator><![CDATA[captain_jack_sparrow@mastodon.world]]></dc:creator><pubDate>Wed, 22 Apr 2026 14:42:48 GMT</pubDate></item><item><title><![CDATA[Reply to Let&#x27;s review the last couple of weeks in #AI land... on Wed, 22 Apr 2026 14:41:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/scottwilson%40infosec.exchange">@<span>scottwilson</span></a></span> Wanna add  this or nah?</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability" title="Chinese Firm Claims AI-Driven Bug Discovery Near Claude Mythos Scale">
<img src="https://substackcdn.com/image/fetch/$s_!TRDG!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2fb3e4f5-c84e-44fd-bace-cf37376dd738_660x377.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability">
Chinese Firm Claims AI-Driven Bug Discovery Near Claude Mythos Scale
</a>
</h5>
<p class="card-text line-clamp-3">Chinese companies could match the capabilities attributed to Claude Mythos within months, according to industry experts, reinforcing existing cyber offense asymmetries</p>
</div>
<a href="https://www.nattothoughts.com/p/where-is-china-in-ai-driven-vulnerability" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://substackcdn.com/image/fetch/$s_!n8eN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36112c11-055e-46ca-9d1c-dc2be6bd49cb%2Ffavicon-16x16.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />































<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.nattothoughts.com)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/cR0w/statuses/116448878663638944</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/cR0w/statuses/116448878663638944</guid><dc:creator><![CDATA[cr0w@infosec.exchange]]></dc:creator><pubDate>Wed, 22 Apr 2026 14:41:16 GMT</pubDate></item></channel></rss>