Passa ai contenuti principali

Post

More detailed assessment of Anthropic Mythos Preview

A follow-up to my previous post on Mythos Preview. The AI Security Institute (AISI) has published a very interesting analysis of Mythos Preview . Very interesting because: AISI is " a mission-driven research organisation in the heart of the UK government ". Its reports are clearly much more credible than claims of the form " our last product is too strong to give you, believe us " by a private US company, that is currently losing lot of money, that is fiercely battling against other  companies in the AI arena, that is extremely good at fuelling hype about their products and capabilities. They consider complete cybersecurity tasks, i.e. CTF (capture the flag) competitions and attacks to a simulated organization. They compare the behavior of different models for a given "token budget". Not surprisingly, Mythos Preview is indeed very good and better than previous models, but it is definitely not the coming Apocalipsis. In particular, it is the first tool th...
Post recenti

On the Anthropic Mythos Preview - "too dangerous to release"

(updated twice after first posting, see below) On April 7-th 2026, Anthropic issued a technical report titled  Assessing Claude Mythos Preview’s cybersecurity capabilities . This report has quickly sparked the all-too-common (and deeply misleading) narrative of an imminent cybersecurity apocalypse due to the (supposedly) immense and groundbreaking capabilities of AI. For example, The New York Times :  I’m really not being hyperbolic when I say that kids could deploy this by accident. Mom and Dad, get ready for: "Honey, what did you do after school today?” “Well, Mom, my friends and I took down the power grid. What’s for dinner?” That is why Anthropic is giving carefully controlled versions to key software providers so they can find and fix the vulnerabilities before the bad guys do — or your kids. What does Anthropic say? The following paragraphs contain a slightly edited AI-generated summary of the Anthropic report Anthropic has introduced Claude Mythos Preview, a langu...

Cybersecurity and money (and Chinese engineers, and digital escorts)

My Cybersecurity course has a lot of technical detail. Maybe not as much as some students wish, at least in certain topics, but finding the appropriate balance between breadth and depth is difficult. I try to convey to students an important message, though: in order to understand the dynamics of cybersecurity in the real world (" why we are still not applying fundamental principles formulated 50 years ago? ", " why there are so many vulnerabilities? ", " why such an obvious defense is not ubiquitous? "), one must never think solely in technical terms or even worse, in moral terms (" you have to make sure that your code does not have any vulnerabilities, otherwise you will be a sinner and go to hell!",  " company X is evil because does not release patches for its vulnerable software! "). What I tell to students is that one must always think in economical terms ( "yes, this defense is interesting...but what is its cost in terms of f...

Quantum Key Distribution and Cybersecurity

I have recently read in a newspaper the claim " once quantum computers are sufficiently advanced, they will render current cybersecurity technologies completely ineffective ". As a civil servant "sufficiently expert" in this field, I feel it is my duty to point out that this claim is deeply wrong. I will do so at least in this web blog. Quantum computers and Post-quantum cryptography (PQC) Once so-called ‘ quantum computers ’ become available in practice, they will be capable of breaking certain cryptographic algorithms that have been widely used for many years and are still used today. For this reason, for years now, there has been a huge push worldwide to accelerate the transition to so-called ‘post-quantum cryptography’ (PQC): cryptographic algorithms that can be executed by the standard computers we already have today , but which cannot be ‘decrypted’ even by the quantum computers of the future . Various PQC algorithms have already been developed and standardise...

Automatic extraction of attack techniques from cybersecurity reports

Maybe I should prove that I am not against AI and that I do use AI for my daily job. In this post I will describe how I extracted  MITRE ATT&CK  techniques from an incident report automatically , by using Gemini (MITRE ATT&CK is a powerful framework for reasoning about attacks and I use this framework intensively in my Cybersecurity course). First a bit of context. Yesterday I posted this note on the team of the course: A recent technical report by Google is a concrete example of many of the concepts discussed in some of the recent lectures. New attack campaigns are discovered by highly skilled organizations, there is an infection chain leading to the final malware, the infection chain may be composed of multiple obfuscated scripts downloaded and executed from different locations, vulnerabilities that may or may not be publicly known at the time of their exploitation allow escalating privilege, IoC and YARA rules are released for the benefit of the rest of the world ....

The impact of AI on the labour market. A (somewhat) contrarian view

The impact of so-called "AI" in coding, programming, cybersecurity is deep and will be more and more so. Many kinds of activities will become much faster or are already so. Predicting the implications of these facts on the job market is hard, though, as predicting the future always is. When I was a student I used to buy the BYTE magazine  every now and then. In September 1990 I bought this issue, that I still have in my library:  The Internet had been "invented" several years earlier ( TCP September 1981, DNS November 1983). I took my degree in December 1989 and at the time we did have the ability to download files from very far away and obscure locations, with ftp . A couple of lectures about computer networks were part of one of the courses I took in 1988. Yet, in 1990, none (none) of the " 63 of the World's Most Influential People in Personal Computing " included the Internet in their " predictions of the future ". One of the few truly ...

Experiments in AI-assisted publishing (coding and cybersecurity)

I am using NotebookLM more and more, for various tasks related to teaching and research. I have to read quite a lot of technical and scientific reports as part of my job and I find it really hard to keep track of all the important insights and news that I discover every day. One extremely useful application of NotebookLM is summarising such sources: sources that I have actually read and that I actually find important . I have decided to start sharing some of these reports publicly. I think some of these topics are very important and maybe there is someone interested in looking at an automatically-generated summary ( that I have read and checked ) of sources that I have carefully selected . Clickable links here : AI-assisted coding Selection of highly insightful analyses of the state of LLM-assisted coding (March 2026) Agents of Chaos An exploratory red-teaming study concerning autonomous language-model-powered agents. The study involved deploying agents in a live...