3 Sources
[1]
New macOS vulnerabilities were exposed by Anthropic's Mythos: report - 9to5Mac
Anthropic's Mythos AI model has famously been kept fairly secret due to its apparent risk to software systems around the world. And today a new report says Mythos was used to expose macOS security vulnerabilities that Apple is investigating now. Robert McMillan, writing at The Wall Street Journal: Security researchers say they have discovered a new way of circumventing Apple's state-of-the art security technology, using techniques they discovered while testing an early version of Anthropic's Mythos AI software in April. The researchers with Calif, a Palo Alto-based security research company, say the software they wrote links together two bugs and a handful of techniques to corrupt the Mac's memory and then gain access to parts of the device that should be inaccessible. It is what's known as a privilege escalation exploit, and if it were chained together with other attacks it could be used by a hacker to seize control of the computer. McMillan says that Apple is currently reviewing the report from Calif to validate its findings. A spokesperson from Apple told the WSJ: ""Security is our top priority, and we take reports of potential vulnerabilities very seriously." The team at Calif assembled a 55-page report that it delivered in person to Apple in Cupertino containing its findings. Calif's chief executive, Thai Dong, said that the attack "couldn't have been pulled off by Mythos alone and leveraged the very human cybersecurity expertise of some of Calif's hackers." Details regarding Calif's discoveries are going to be released by the company once the underlying issues are addressed by Apple. Duong told the WSJ that he thinks the bugs "will likely be fixed pretty quickly."
[2]
Apple Alerted to macOS Security Vulnerability Uncovered With AI Tool
Anthropic recently announced Project Glasswing, an initiative that enables tech companies like Apple to use its new frontier AI model Claude Mythos Preview to find security vulnerabilities across operating systems and web browsers. The Wall Street Journal today reported that researchers at cybersecurity firm Calif used Claude Mythos Preview to uncover a new macOS security vulnerability last month. Specifically, they used the model to write code that links together two macOS bugs in a way that resulted in what is known as a privilege escalation exploit. The security researchers said the exploit would not have been possible with Mythos alone, as it still required their human expertise on top, but it nevertheless proves that AI can assist with discovering software vulnerabilities. Apple said it was reviewing Calif's report to validate the findings. "Security is our top priority, and we take reports of potential vulnerabilities very seriously," an Apple spokesperson told The Wall Street Journal. It is unclear if Apple has already patched the exploit. Apple's security notes for the macOS 26.5 update released this week mention a fix for a kernel-level vulnerability, and it credits Calif and Anthropic for discovering it. Yet, the report said that Calif only met with Apple this week and suggested that a fix was still coming. We have reached out to Apple for comment.
[3]
Apple Mac M5 System Exploited With Anthropic's Claude Mythos AI, Researchers Claim - Decrypt
The company says a preview version of Anthropic's Claude Mythos AI helped identify bugs and assist with exploit development. Apple devices have long been considered among the hardest consumer systems to hack because of the company's tightly integrated hardware and software security. Now, a security startup claims a small team of researchers used a preview version of Anthropic's Claude Mythos to build a working exploit against Apple's new M5 chip protections in less than a week. In a Substack post published Thursday, the Vietnam-based Calif said it developed what it describes as the first public macOS kernel memory corruption exploit capable of surviving Apple's new Memory Integrity Enforcement, or MIE, protections on M5 hardware. Calif said it shared the findings with Apple in a meeting at the tech giant's headquarters in California. "We wanted to report it in person, instead of getting buried in the submission flood that some unfortunate Pwn2Own participants just experienced," Calif wrote. "Most respected hackers avoid human interaction whenever possible, so this physical strategy may give us a slight edge in the eternal race for five minutes of fame and glory on Twitter." According to Calif, the "attack path" was discovered accidentally after researchers found the bugs on April 25, then developed a working exploit by May 1. The exploit chain targets macOS 26 running on Apple M5 systems. According to the company, the attack starts from an unprivileged local user account and escalates to root access using standard system calls. The exploit reportedly combines two vulnerabilities and additional techniques targeting bare-metal M5 hardware with kernel MIE enabled. Calif said Mythos Preview helped identify the vulnerabilities and assist throughout exploit development, but added that human expertise was still necessary to bypass Apple's new MIE protections. "Part of our motivation was to test what's possible when the best models are paired with experts," the company wrote. "Landing a kernel memory corruption exploit against the best protections in a week is noteworthy, and says something strong about this pairing." Memory corruption bugs are still one of the most common ways attackers break into operating systems and apps, because they can let an attacker crash the program, steal data, or even take control of it. Apple's MIE feature uses memory-tagging technology to make those attacks much harder. Anthropic released the preview version of Mythos in April after internal testing and outside evaluations suggested the model could autonomously identify and exploit software vulnerabilities at a level beyond previous public AI models. Rather than release it publicly, Anthropic restricted access to select technology companies, banks, and researchers under its Project Glasswing initiative. That same month, it was also revealed that the U.S. National Security Agency was using Mythos despite an ongoing feud between Anthropic and the Donald Trump administration. Mozilla later said Mythos identified 271 vulnerabilities in Firefox during internal testing, while the U.K.'s AI Security Institute found the model could autonomously complete sophisticated multi-stage cyberattack simulations. Users on Myriad -- a prediction market platform operated by Decrypt's parent company, Dastan -- do not believe a full release of Claude Mythos is imminent, penciling in just a 10.5% chance of a public launch by June 30, as of this writing. Calif called the Apple M5 exploit "a glimpse of what is coming." "Apple built MIE in a world before Mythos Preview," Calif wrote. "We're about to learn how the best mitigation technology on Earth holds up during the first AI bugmageddon."
Share
Copy Link
Security firm Calif used Anthropic's Claude Mythos Preview to discover new macOS vulnerabilities affecting Apple M5 systems. The AI tool helped researchers develop a privilege escalation exploit in less than a week, bypassing Apple's Memory Integrity Enforcement protections. Apple is now investigating the findings, marking a significant moment in AI-assisted cybersecurity research.
Security researchers at Calif, a Palo Alto-based cybersecurity firm, have used Anthropic Mythos to expose significant macOS vulnerabilities that challenge Apple's state-of-the-art security technology
1
. The discovery, made possible through Anthropic's Claude Mythos Preview under Project Glasswing, demonstrates how AI in cybersecurity is reshaping vulnerability research at an unprecedented pace2
.
Source: Decrypt
The team at Calif developed what they describe as the first public macOS kernel memory corruption exploit capable of surviving Apple's new Memory Integrity Enforcement (MIE) protections on M5 hardware
3
. What makes this discovery particularly noteworthy is the speed at which it occurred. Security researchers accidentally found the bugs on April 25 and had developed a working exploit by May 1—less than a week later3
.The software vulnerabilities discovered by Calif link together two bugs and multiple techniques to corrupt the Mac's memory, then gain access to parts of the device that should remain inaccessible
1
. This creates what's known as a privilege escalation exploit—a type of attack that, when chained with other exploits, could allow a hacker to seize complete control of the computer.The attack path targets macOS 26 running on Apple M5 systems, starting from an unprivileged local user account and escalating to root access using standard system calls
3
. Memory corruption bugs remain one of the most common methods attackers use to break into operating systems because they can crash programs, steal data, or enable complete system takeover. Apple's MIE feature uses memory-tagging technology specifically designed to make such attacks significantly harder to execute.While Anthropic Mythos played a crucial role in identifying the macOS security vulnerability, Calif's chief executive Thai Duong emphasized that the attack "couldn't have been pulled off by Mythos alone and leveraged the very human cybersecurity expertise of some of Calif's hackers"
1
. The researchers noted that Claude Mythos Preview helped identify the vulnerabilities and assisted throughout exploit development, but human expertise remained necessary to bypass Apple's new MIE protections3
.
Source: MacRumors
This collaboration between AI and security researchers reveals an important dynamic in modern cybersecurity work. "Part of our motivation was to test what's possible when the best models are paired with experts," Calif wrote. "Landing a kernel memory corruption exploit against the best protections in a week is noteworthy, and says something strong about this pairing"
3
.Related Stories
Apple is currently reviewing Calif's report to validate its findings. An Apple spokesperson told The Wall Street Journal: "Security is our top priority, and we take reports of potential vulnerabilities very seriously"
1
. Calif assembled a comprehensive 55-page report that it delivered in person to Apple at the company's Cupertino headquarters1
.Duong told the WSJ that he expects the bugs "will likely be fixed pretty quickly"
1
. Apple's security notes for the macOS 26.5 update released this week mention a fix for a kernel-level vulnerability, crediting Calif and Anthropic for discovering it, though the timeline remains somewhat unclear2
.
Source: 9to5Mac
Calif plans to release detailed information about its discoveries once Apple addresses the underlying issues
1
. The company chose to report the findings in person rather than risk "getting buried in the submission flood that some unfortunate Pwn2Own participants just experienced"3
.Anthropic released the preview version of Mythos in April after internal testing and outside evaluations suggested the model could autonomously identify and exploit software vulnerabilities at a level beyond previous public AI models
3
. Rather than releasing it publicly, Anthropic restricted access to select technology companies, banks, and security researchers under its Project Glasswing initiative.Mozilla reported that Mythos identified 271 vulnerabilities in Firefox during internal testing, while the U.K.'s AI Security Institute found the model could autonomously complete sophisticated cyberattack simulations
3
. These findings demonstrate the model's capabilities across different platforms and attack scenarios.Calif called the Apple M5 exploit "a glimpse of what is coming," noting that "Apple built MIE in a world before Mythos Preview. We're about to learn how the best mitigation technology on Earth holds up during the first AI bugmageddon"
3
. This statement raises questions about whether existing security defenses, even the most advanced ones, can withstand the accelerated pace of AI-assisted vulnerability discovery. Developers and security teams should watch closely as this technology becomes more widely available, potentially forcing a fundamental shift in how quickly patches must be developed and deployed.Summarized by
Navi
14 Apr 2026•Technology

22 Apr 2026•Technology

30 Apr 2026•Technology

1
Technology

2
Technology

3
Policy and Regulation
