{"id":109769,"date":"2026-05-15T10:54:40","date_gmt":"2026-05-15T10:54:40","guid":{"rendered":"https:\/\/neclink.com\/index.php\/2026\/05\/15\/security-researchers-aided-by-anthropics-mythos-claim-to-have-breached-macos\/"},"modified":"2026-05-15T10:54:40","modified_gmt":"2026-05-15T10:54:40","slug":"security-researchers-aided-by-anthropics-mythos-claim-to-have-breached-macos","status":"publish","type":"post","link":"https:\/\/neclink.com\/index.php\/2026\/05\/15\/security-researchers-aided-by-anthropics-mythos-claim-to-have-breached-macos\/","title":{"rendered":"Security Researchers, Aided By Anthropic&#8217;s Mythos, Claim To Have Breached macOS"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"content\">\n<article class=\"news-post\">&#13;<br \/>\n    &#13;<br \/>\n    &#13;<br \/>\n    &#13;<\/p>\n<p>&#13;<br \/>\n    &#13;<\/p>\n<div class=\"news-article\">\n<div class=\"slide-key image-holder gallery-image-holder credit-image-wrap lead-image-holder\" data-post-url=\"https:\/\/www.engadget.com\/2173543\/security-researchers-anthropic-mythos-macos-exploit\/\" data-post-title=\"Security researchers, aided by Anthropic's Mythos, claim to have  breached macOS\" data-slide-num=\"0\" data-post-id=\"2173543\">\n<picture id=\"p3cc4f3ae2fea912ac639b48249953b10\">&#13;<source media=\"(min-width: 429px)\" srcset=\"https:\/\/www.engadget.com\/img\/gallery\/security-researchers-aided-by-anthropics-mythos-claim-to-have-breached-macos\/intro-1778841183.webp\" type=\"image\/webp\">&#13;<source media=\"(max-width: 428px)\" srcset=\"https:\/\/www.engadget.com\/img\/gallery\/security-researchers-aided-by-anthropics-mythos-claim-to-have-breached-macos\/intro-1778841183.sm.webp\" type=\"image\/webp\">&#13;<br \/>\n                        <img fetchpriority=\"high\" decoding=\"async\" class=\"gallery-image \" src=\"https:\/\/www.engadget.com\/img\/gallery\/security-researchers-aided-by-anthropics-mythos-claim-to-have-breached-macos\/intro-1778841183.jpg\" data-slide-url=\"https:\/\/www.engadget.com\/2173543\/security-researchers-anthropic-mythos-macos-exploit\/\" data-post-id=\"2173543\" data-slide-num=\"0\" data-slide-title=\"Security researchers, aided by Anthropic's Mythos, claim to have  breached macOS: \" width=\"780\" height=\"438\" alt=\"A person using a MacBook.\"\/>&#13;<br \/>\n                    <\/source><\/source><\/picture>\n                    <span class=\"gallery-image-credit\">Apple<\/span>\n                    <\/div>\n<div class=\"columns-holder \">\n<p>Apple&#8217;s operating systems are known for their security, especially compared to their rivals in mobile and computing.\u00a0Now, security researchers from a Palo Alto-based company called\u00a0Calif <a href=\"https:\/\/blog.calif.io\/p\/first-public-kernel-memory-corruption\" target=\"_blank\">claim<\/a> they were able to breach macOS after designing\u00a0a privilege escalation exploit with help from <a href=\"https:\/\/www.engadget.com\/ai\/anthropic-launches-project-glasswing-an-effort-to-prevent-ai-cyberattacks-with-ai-214939773.html\" target=\"_blank\">Anthropic&#8217;s Claude Mythos Preview<\/a>.\u00a0As <em><a href=\"https:\/\/www.wsj.com\/tech\/ai\/anthropic-mythos-apple-macos-bug-339da403\" target=\"_blank\">The Wall Street Journal<\/a><\/em> reports,\u00a0the exploit could be used to access parts of the MacBook that should be inaccessible and, thus, allows the attacker to take control of a Mac computer.<\/p>\n<p>The researchers worked with Mythos to identify the vulnerabilities and to help them with the exploit&#8217;s development. Mythos Preview was able to identify the bugs quickly, because they belonged to known classes. Human expertise was still necessary to be able to design the exploit, but this shows advanced AI systems could unearth bugs and attack paths that were previously unknown and could be used by bad actors to stage security breaches.\u00a0<\/p>\n<p>Apple is taking the researchers&#8217; findings seriously, and told <em>The Journal<\/em>: &#8220;Security is our top priority, and we take reports of potential vulnerabilities very seriously.&#8221; In fact, the researchers already met with the company at Apple Park in Cupertino to discuss what they&#8217;re calling the &#8220;first public macOS kernel memory corruption exploit on M5 silicon.&#8221; If the details they shared sounded vague, it&#8217;s because they&#8217;re planning to release the full technical details of their findings after Apple fixes the vulnerabilities and attack path.<\/p>\n<p>Anthropic uses Claude Mythos Preview for <a href=\"https:\/\/www.engadget.com\/ai\/anthropic-launches-project-glasswing-an-effort-to-prevent-ai-cyberattacks-with-ai-214939773.html\" target=\"_blank\">Project Glasswing<\/a>, the initiative it launched in April to prevent AI cyberattacks with AI. Glasswing participants, including\u00a0Amazon Web Services, Apple, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA and Palo Alto Networks, can\u00a0use Mythos to strengthen the security of their own projects. Mozilla, for instance, previously announced that it <a href=\"https:\/\/www.engadget.com\/ai\/mozilla-says-it-patched-271-firefox-vulnerabilities-thanks-to-anthropics-claude-mythos-224330023.html\" target=\"_blank\">found and patched<\/a>\u00a0271 vulnerabilities in its latest release of the Firefox browser with help from Mythos.\u00a0<\/p>\n<p>Just a few days ago, OpenAI introduced its own cybersecurity initiative in response to Glasswing and Mythos. OpenAI&#8217;s <a href=\"https:\/\/www.engadget.com\/2170410\/daybreak-openai-cybersecurity-initiative\/\" target=\"_blank\">Daybreak<\/a> uses\u00a0its various AI models, including its specialized security agent Codex. It was designed around the premise that cyber defense should be built into software from the beginning and not just revolve around finding and fixing vulnerabilities.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>&#13;<br \/>\n    &#13;<br \/>\n<\/article>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/2173543\/security-researchers-anthropic-mythos-macos-exploit\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#13; &#13; &#13; &#13; &#13; &#13; &#13;&#13;&#13; &#13; Apple Apple&#8217;s operating systems are known for their security, especially compared to their rivals in mobile and<\/p>\n","protected":false},"author":1,"featured_media":109770,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[157],"tags":[],"class_list":["post-109769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gadget"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/109769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/comments?post=109769"}],"version-history":[{"count":0,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/109769\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media\/109770"}],"wp:attachment":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media?parent=109769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/categories?post=109769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/tags?post=109769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}