Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
22 Indlæg 15 Posters 1 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.social
    wrote sidst redigeret af
    #1

    I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

    gossithedog@cyberplace.socialG avuko@infosec.exchangeA troed@swecyb.comT sandorspruit@mastodon.nlS pyrogenesis@mefi.socialP 6 Replies Last reply
    1
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

      gossithedog@cyberplace.socialG This user is from outside of this forum
      gossithedog@cyberplace.socialG This user is from outside of this forum
      gossithedog@cyberplace.social
      wrote sidst redigeret af
      #2

      Companion video https://youtu.be/fM7GIIylXqI

      ibrahimhammad@mastodon.socialI gossithedog@cyberplace.socialG 2 Replies Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

        avuko@infosec.exchangeA This user is from outside of this forum
        avuko@infosec.exchangeA This user is from outside of this forum
        avuko@infosec.exchange
        wrote sidst redigeret af
        #3

        @GossiTheDog @malwaretech

        Aisle (active in this space) did the research backing this up:

        https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

          troed@swecyb.comT This user is from outside of this forum
          troed@swecyb.comT This user is from outside of this forum
          troed@swecyb.com
          wrote sidst redigeret af
          #4

          @GossiTheDog

          I was under the impression that the open source projects they communicated their findings with have confirmed them?

          Stringing together exploits and ROP-chains is what had me take it seriously. It's not that we can't do that as well, it's being able to automate it at scale that's worrying.

          (And that's not a worry about _Mythos_ - we know the open models lag ~1 year behind the cloud models so these capabilities can be expected to be at nation state actors about now and with "everyone" in a year)

          @malwaretech

          jinna@gts.laalaa.landJ 1 Reply Last reply
          0
          • troed@swecyb.comT troed@swecyb.com

            @GossiTheDog

            I was under the impression that the open source projects they communicated their findings with have confirmed them?

            Stringing together exploits and ROP-chains is what had me take it seriously. It's not that we can't do that as well, it's being able to automate it at scale that's worrying.

            (And that's not a worry about _Mythos_ - we know the open models lag ~1 year behind the cloud models so these capabilities can be expected to be at nation state actors about now and with "everyone" in a year)

            @malwaretech

            jinna@gts.laalaa.landJ This user is from outside of this forum
            jinna@gts.laalaa.landJ This user is from outside of this forum
            jinna@gts.laalaa.land
            wrote sidst redigeret af
            #5

            @troed @GossiTheDog @malwaretech Everything they actually sent out went through competent human professionals that were well compensated, they prove nothing.

            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              Companion video https://youtu.be/fM7GIIylXqI

              ibrahimhammad@mastodon.socialI This user is from outside of this forum
              ibrahimhammad@mastodon.socialI This user is from outside of this forum
              ibrahimhammad@mastodon.social
              wrote sidst redigeret af
              #6

              @GossiTheDog
              Hello, I'm Ibrahim from Gaza. I have Down syndrome and anemia. Please help me. Even small donations make a difference. Please share this pinned post to spread the word.

              1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                sandorspruit@mastodon.nlS This user is from outside of this forum
                sandorspruit@mastodon.nlS This user is from outside of this forum
                sandorspruit@mastodon.nl
                wrote sidst redigeret af
                #7

                @GossiTheDog @malwaretech @steltenpower Well, well, well. Our old friends Fear, Uncertainty and Doubt 😏

                1 Reply Last reply
                0
                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                  Companion video https://youtu.be/fM7GIIylXqI

                  gossithedog@cyberplace.socialG This user is from outside of this forum
                  gossithedog@cyberplace.socialG This user is from outside of this forum
                  gossithedog@cyberplace.social
                  wrote sidst redigeret af
                  #8

                  I don't think anybody actually watches videos any more, so here's MWT's core point -

                  The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                  So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                  The proof is going to be if any of the open source vulns turn out to be important. So far:

                  gossithedog@cyberplace.socialG wall_e@ioc.exchangeW mikesiegel@infosec.exchangeM simonzerafa@infosec.exchangeS 4 Replies Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    I don't think anybody actually watches videos any more, so here's MWT's core point -

                    The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                    So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                    The proof is going to be if any of the open source vulns turn out to be important. So far:

                    gossithedog@cyberplace.socialG This user is from outside of this forum
                    gossithedog@cyberplace.socialG This user is from outside of this forum
                    gossithedog@cyberplace.social
                    wrote sidst redigeret af
                    #9

                    Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                    What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                    It's not though, is it?

                    agowa338@chaos.socialA bontchev@infosec.exchangeB T 3 Replies Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                      What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                      It's not though, is it?

                      agowa338@chaos.socialA This user is from outside of this forum
                      agowa338@chaos.socialA This user is from outside of this forum
                      agowa338@chaos.social
                      wrote sidst redigeret af
                      #10

                      @GossiTheDog

                      Well cybersecurity is over but not because of this but because of everyone and their mother deploying openclaw in production...

                      cure53@infosec.exchangeC 1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        I don't think anybody actually watches videos any more, so here's MWT's core point -

                        The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                        So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                        The proof is going to be if any of the open source vulns turn out to be important. So far:

                        wall_e@ioc.exchangeW This user is from outside of this forum
                        wall_e@ioc.exchangeW This user is from outside of this forum
                        wall_e@ioc.exchange
                        wrote sidst redigeret af
                        #11

                        @GossiTheDog from a practical perspective what worries me more is time to poc/working exploit for known vulns.

                        OSS library releases patch, model looks at diff + cve description and drops a working exploit for a couple of hundred $ of compute.

                        Most companies (at least this side of the pond) are not currently equipped to deal with continuously applying patches for 1-day vulns in prod.
                        Many large orgs here are proud that they've managed to get on a monthly update cycle

                        wall_e@ioc.exchangeW 1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                          pyrogenesis@mefi.socialP This user is from outside of this forum
                          pyrogenesis@mefi.socialP This user is from outside of this forum
                          pyrogenesis@mefi.social
                          wrote sidst redigeret af
                          #12

                          @GossiTheDog @malwaretech The number of people who should know better just going "*this time* the PR blather is true, I just know it!" is pretty cringe.

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                            What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                            It's not though, is it?

                            bontchev@infosec.exchangeB This user is from outside of this forum
                            bontchev@infosec.exchangeB This user is from outside of this forum
                            bontchev@infosec.exchange
                            wrote sidst redigeret af
                            #13

                            @GossiTheDog Haven't we already been there with fuzzing?

                            Anyway, even if Mythos is as good as they claim, that's not really a problem as long as it is available only to a few. It's when every script kiddie gets access to it that we should start worrying.

                            cure53@infosec.exchangeC 1 Reply Last reply
                            0
                            • wall_e@ioc.exchangeW wall_e@ioc.exchange

                              @GossiTheDog from a practical perspective what worries me more is time to poc/working exploit for known vulns.

                              OSS library releases patch, model looks at diff + cve description and drops a working exploit for a couple of hundred $ of compute.

                              Most companies (at least this side of the pond) are not currently equipped to deal with continuously applying patches for 1-day vulns in prod.
                              Many large orgs here are proud that they've managed to get on a monthly update cycle

                              wall_e@ioc.exchangeW This user is from outside of this forum
                              wall_e@ioc.exchangeW This user is from outside of this forum
                              wall_e@ioc.exchange
                              wrote sidst redigeret af
                              #14

                              @GossiTheDog to be fair, the current time to poc is in many cases already down ≤ 1 day or so, but this could take some of the skill out of it and make it more broadly available

                              wall_e@ioc.exchangeW 1 Reply Last reply
                              0
                              • agowa338@chaos.socialA agowa338@chaos.social

                                @GossiTheDog

                                Well cybersecurity is over but not because of this but because of everyone and their mother deploying openclaw in production...

                                cure53@infosec.exchangeC This user is from outside of this forum
                                cure53@infosec.exchangeC This user is from outside of this forum
                                cure53@infosec.exchange
                                wrote sidst redigeret af
                                #15

                                @agowa338 Cyber security is an insanely complex beast with some parts being technical, some being human, some being regulatory, etc., and well, finding bugs is one small component.

                                Emphasis on small.

                                We have not really been great at cyber security in the past, and improvements are needed all across the board. We won't be great at it tomorrow because magic.

                                Having one component potentially improve is, especially given how speculative the current situation is, is nothing to really worry about. Rather the contrary.

                                Time will tell, some processes might change, and that is likely all that will happen for a long time.

                                Most humans in cyber security will very likely notice very little impact for now. Can this all go sideways? Yes, of course. Is it time to say that cyber security is over? I don't think so. At all.

                                agowa338@chaos.socialA 1 Reply Last reply
                                0
                                • wall_e@ioc.exchangeW wall_e@ioc.exchange

                                  @GossiTheDog to be fair, the current time to poc is in many cases already down ≤ 1 day or so, but this could take some of the skill out of it and make it more broadly available

                                  wall_e@ioc.exchangeW This user is from outside of this forum
                                  wall_e@ioc.exchangeW This user is from outside of this forum
                                  wall_e@ioc.exchange
                                  wrote sidst redigeret af
                                  #16

                                  @GossiTheDog but other than that... yeah hype-marketing playbook 101.

                                  Didn't OpenAI pull the:"oh no it's too powerful, humanity couldn't take it yet so we're not releasing it to the public", stunt with one of their earlier models as well?^^

                                  1 Reply Last reply
                                  0
                                  • cure53@infosec.exchangeC cure53@infosec.exchange

                                    @agowa338 Cyber security is an insanely complex beast with some parts being technical, some being human, some being regulatory, etc., and well, finding bugs is one small component.

                                    Emphasis on small.

                                    We have not really been great at cyber security in the past, and improvements are needed all across the board. We won't be great at it tomorrow because magic.

                                    Having one component potentially improve is, especially given how speculative the current situation is, is nothing to really worry about. Rather the contrary.

                                    Time will tell, some processes might change, and that is likely all that will happen for a long time.

                                    Most humans in cyber security will very likely notice very little impact for now. Can this all go sideways? Yes, of course. Is it time to say that cyber security is over? I don't think so. At all.

                                    agowa338@chaos.socialA This user is from outside of this forum
                                    agowa338@chaos.socialA This user is from outside of this forum
                                    agowa338@chaos.social
                                    wrote sidst redigeret af
                                    #17

                                    @cure53

                                    I know. I've been done that. I was the only technician that talked to the compliance people so I "earned" all of the work involved in communicating and bridging both worlds.

                                    And since then it just got worse. Nobody cares about it security. The compliance people are just writing some shit and at this point in many companies they don't even expect their technicians to actually implement it anymore either (if it is even possible at all).

                                    It's just a work creation measure at this point…

                                    1 Reply Last reply
                                    0
                                    • bontchev@infosec.exchangeB bontchev@infosec.exchange

                                      @GossiTheDog Haven't we already been there with fuzzing?

                                      Anyway, even if Mythos is as good as they claim, that's not really a problem as long as it is available only to a few. It's when every script kiddie gets access to it that we should start worrying.

                                      cure53@infosec.exchangeC This user is from outside of this forum
                                      cure53@infosec.exchangeC This user is from outside of this forum
                                      cure53@infosec.exchange
                                      wrote sidst redigeret af
                                      #18

                                      @bontchev @GossiTheDog Agreed. Current recommendation from our end:

                                      Keep calm, find and fix bugs, make the world a bit safer one bug at a time...

                                      And ignore the hype train, but keep an open eye on how real and measurable things develop. Just what we did before.

                                      1 Reply Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        I don't think anybody actually watches videos any more, so here's MWT's core point -

                                        The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                                        So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                                        The proof is going to be if any of the open source vulns turn out to be important. So far:

                                        mikesiegel@infosec.exchangeM This user is from outside of this forum
                                        mikesiegel@infosec.exchangeM This user is from outside of this forum
                                        mikesiegel@infosec.exchange
                                        wrote sidst redigeret af
                                        #19

                                        @GossiTheDog he makes a good point about the subsidized cost. It's like in the early days when Uber was cheap AF to put the taxis out of business. Once they had market share, they cost as much as taxis.

                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                                          What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                                          It's not though, is it?

                                          T This user is from outside of this forum
                                          T This user is from outside of this forum
                                          trademark@fosstodon.org
                                          wrote sidst redigeret af
                                          #20

                                          @GossiTheDog They aren't claiming it's over, that's a strawman. But interestingly they are providing commit hashes of things they've found. Some of these are seriously scary. I've saved a copy of the webpage and will be waiting to see if the promised commits turn up. If they do check out my opinion of Anthropic will rise. If not...

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper