Close Menu
    Facebook X (Twitter) Instagram
    Articles Stock
    • Home
    • Technology
    • AI
    • Pages
      • About ArticlesStock — AI & Technology Journalist
      • Contact us
      • Disclaimer For Articles Stock
      • Privacy Policy
      • Terms and Conditions
    Facebook X (Twitter) Instagram
    Articles Stock
    AI

    Discord Sleuths Gained Unauthorized Entry to Anthropic’s Mythos

    Naveed AhmadBy Naveed Ahmad25/04/2026Updated:25/04/2026No Comments7 Mins Read
    Security News This Week Discord Group Reportedly Guessed Its Way Into Anthropic Mythos Security


    As researchers and practitioners debate the impression that new AI fashions could have on cybersecurity, Mozilla mentioned on Tuesday it used early entry to Anthropic’s Mythos Preview to search out and repair 271 vulnerabilities in its new Firefox 150 browser launch. In the meantime, researchers recognized a gaggle of reasonably profitable North Korean hackers utilizing AI for every thing from vibe coding malware to creating faux firm web sites—stealing as much as $12 million in three months.

    Researchers have lastly cracked disruptive malware generally known as Fast16 that predates Stuxnet and will have been used to focus on Iran’s nuclear program. It was created in 2005 and was seemingly deployed by the US or an ally.

    Meta is being sued by the Shopper Federation of America, a nonprofit, over rip-off advertisements on Fb and Instagram and allegedly deceptive shoppers concerning the firm’s efforts to fight them. A United States surveillance program that lets the FBI view People’ communications and not using a warrant is up for renewal, however lawmakers are deadlocked on subsequent steps. A brand new invoice goals to deal with mounting lawmaker issues, however lacks substance.

    And when you’re on the lookout for a deep dive, WIRED investigated the yearslong feud behind the distinguished privateness and safety aware cellular working system GrapheneOS. Plus we regarded on the unusual story of how China spied on US determine skater Alysa Liu and her dad.

    And there’s extra. Every week, we spherical up the safety and privateness information we didn’t cowl in depth ourselves. Click on the headlines to learn the complete tales. And keep protected on the market.

    Anthropic’s Mythos Preview AI mannequin has been touted as a dangerously succesful device for locating safety vulnerabilities in software program and networks, so highly effective that its creator has rigorously restricted its launch. However one group of beginner sleuths on Discord discovered their very own, comparatively easy methods—no AI hacking required—to achieve unauthorized entry to a coveted digital prize: Mythos itself.

    Regardless of Anthropic’s efforts to regulate who can use Mythos Preview, a gaggle of Discord customers gained entry to the device via some easy comparatively detective work: They examined information from a current breach of Mercor, an AI coaching startup that works with builders, and “made an informed guess concerning the mannequin’s on-line location primarily based on information concerning the format Anthropic has used for different fashions”—a phrase that many observers have speculated refers to an internet URL—in response to Bloomberg, which broke the story.

    The particular person additionally reportedly took benefit of permissions they already possessed to entry different Anthropic fashions, due to their work for an Anthropic contracting agency. On account of their probing, nonetheless, they allegedly gained entry to not solely Mythos however different unreleased Anthropic AI fashions, too. Fortunately, in response to Bloomberg, the group that accessed Mythos has solely used it up to now to construct easy web sites—a choice designed to forestall its detection by Anthropic—relatively than hack the planet.

    Safety researchers have lengthy warned that the telecom protocols generally known as Signaling System 7, or SS7, which govern how cellphone networks join to at least one one other and route calls and texts, are weak to abuse that may enable surreptitious surveillance. This week researchers on the digital rights group Citizen Lab revealed that at the least two for-profit surveillance distributors have truly used these vulnerabilities—or comparable ones within the subsequent technology of telecom protocols—to spy on actual victims. Citizen Lab discovered that two surveillance corporations had primarily acted as rogue cellphone carriers, exploiting entry to a few small telecom corporations—Israeli service 019Mobile, British cell supplier Tango Cellular, and Airtel Jersey, primarily based on the island of Jersey within the English Channel—to trace the situation of targets’ telephones. Citizen Lab’s researchers say that “high-profile” folks have been tracked by the 2 surveillance corporations, although it declined to call both the corporations or their targets. Researchers warn, too, that the 2 firms they found abusing the protocols are seemingly not alone, and that the vulnerability of world telecom protocols stays a really actual vector for cellphone spying worldwide.

    In an indication of a rising—if belated—crackdown by US regulation enforcement on the sprawling prison trade of human-trafficking-fueled rip-off compounds throughout Southeast Asia, the Division of Justice this week introduced prices in opposition to two Chinese language males for allegedly serving to to handle a rip-off compound in Myanmar and searching for to open a second compound in Cambodia. Jiang Wen Jie and Huang Xingshan have been each arrested in Thailand earlier this yr on immigration prices, in response to prosecutors, and now face prices for allegedly operating an unlimited scamming operation that lured human trafficking victims to their compound with faux job presents after which compelled them to rip-off victims, together with People, for thousands and thousands of {dollars} with cryptocurrency fraudulent investments. The DOJ says it additionally “restrained” $700 million in funds belonging to the operation—primarily freezing the funds in preparation for seizure—and likewise seized a channel on the messaging app Telegram prosecutors say was used to bait and enslave trafficking victims. The Justice Division’s assertion claims that Huang personally took half within the bodily punishment of employees in a single compound, and that Jiang at one level oversaw the theft of $3 million from a single US rip-off sufferer.

    Three scientific analysis establishments have been discovered promoting British residents’ well being data on Alibaba, the British authorities and the nonprofit UK Biobank revealed this week. During the last 20 years, greater than 500,000 folks have shared their well being information—together with medical pictures, genetic data, and well being care information—with UK Biobank, which permits scientists world wide to entry the knowledge to conduct medical analysis. Nevertheless, the charity mentioned the information leak concerned a “breach of the contract” signed by three organizations, with one of many datasets on the market believed to have included information on all half-million analysis topics. It didn’t element the complete sorts of information that have been listed on the market however mentioned it has suspended the Biobank accounts of these allegedly promoting the knowledge. The advertisements for the information have additionally been eliminated.

    Earlier this month, 404 Media reported that the FBI was capable of get copies of Sign messages from a defendant’s iPhone because the content material of the messages, that are encrypted inside Sign, have been saved in an iOS push notification database. On this occasion, the copies of the messages have been nonetheless accessible despite the fact that Sign had been faraway from the cellphone—although the problem affected all apps that ship push notifications.

    This week, in response to the problem, Apple launched an iOS and iPadOS safety replace to repair the flaw. “Notifications marked for deletion may very well be unexpectedly retained on the machine,” Apple’s safety replace for iOS 26.4.2 says. “A logging challenge was addressed with improved information redaction.”

    Whereas the problem has been mounted, it’s nonetheless value altering what seems in notifications in your machine. For Sign you’ll be able to open the app, go to Settings, Notifications, and toggle notifications to indicate Identify Solely or No Identify or Content material. It’s one other reminder that whereas apps corresponding to Sign are end-to-end encrypted, this is applicable to the content material because it strikes between gadgets: If somebody can bodily entry and unlock your cellphone, there’s the potential they will entry every thing in your machine.



    Source link

    Naveed Ahmad

    Naveed Ahmad is a technology journalist and AI writer at ArticlesStock, covering artificial intelligence, machine learning, and emerging tech policy. Read his latest articles.

    Related Posts

    Why Tokyo is an important tech vacation spot of 2026

    25/04/2026

    Tim Cook dinner is stepping down. What occurs to Apple now?

    25/04/2026

    Nuclear startup X-energy raises $1B in knowledge center-driven IPO

    25/04/2026
    Leave A Reply Cancel Reply

    Categories
    • AI
    Recent Comments
      Facebook X (Twitter) Instagram Pinterest
      © 2026 ThemeSphere. Designed by ThemeSphere.

      Type above and press Enter to search. Press Esc to cancel.