Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos
    Cybersecurity

    Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos

    adminBy adminApril 23, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Chinese AI
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A Chinese cybersecurity firm has claimed AI-driven vulnerability discovery capabilities that approach the scale of those attributed to Anthropic’s recently unveiled Claude Mythos model. 

    The claims have been analyzed by Eugenio Benincasa, an ETH Zurich cybersecurity researcher focusing on China, in a post published on the Natto Thoughts blog.

    Anthropic claims that its new Mythos frontier model has autonomously discovered thousands of vulnerabilities. To prevent potential abuse, Mythos has not been publicly released and is only available to a few dozen major organizations through Project Glasswing. 

    However, Anthropic’s own chief executive has suggested that open source models and Chinese developers could replicate Mythos-level performance within 6-12 months, a view echoed by researchers at cloud security firm Wiz. 

    According to Benincasa, claims made by the 360 Digital Security Group at 360 Security Technology (Qihoo 360), one of China’s largest cybersecurity companies, in the weeks surrounding Anthropic’s unveiling of Claude Mythos suggest that the company’s AI may have similar vulnerability-discovery capabilities. 

    360 Digital Security Group’s claims center on an internally developed ‘Multi-Agent Collaborative Vulnerability Discovery System’, which appears to have played an important role in its first-place finish at Tianfu Cup, a major Chinese hacking competition that was revived this year. 

    Advertisement. Scroll to continue reading.

    The firm says the system contributed to roughly half of the vulnerabilities it identified at the contest, finding close to 1,000 vulnerabilities in total, including over 50 high-severity flaws across Windows, Microsoft Office, Android, OpenClaw, IoT devices, and other products.

    The most striking individual claim involves CVE-2026-32190, a critical Office vulnerability that 360 says its AI agent identified within minutes, after it had allegedly gone undetected for roughly eight years. A separate Windows kernel vulnerability (CVE-2026-24293) was also claimed, though Microsoft credits researchers from Taiwan and South Korea with that discovery, casting doubt on 360’s claims.

    Benincasa cautions that while 360’s AI capabilities appear significant, they do not yet appear to match the reasoning capabilities described for Claude Mythos. A closer comparison, the expert suggests, is Google’s Big Sleep, which accelerates discrete stages of vulnerability research rather than operating as a fully autonomous agent. 

    However, the expert believes other aspects may ultimately matter more than any technical comparison. Chinese legislation requires private companies and researchers to report vulnerabilities to government agencies before disclosing them publicly, effectively channeling elite security research into state intelligence pipelines. 

    This puts China at an advantage compared to the United States, Europe, and other democratic countries, Benincasa noted.

    As for Mythos’ capabilities, outside of Anthropic’s claims, Mozilla said the AI helped it find over 270 Firefox vulnerabilities, and Palo Alto Networks reported a significant boost in vulnerability discovery. 

    Others, however, pointed out that only a few dozen public CVEs have been credited to Anthropic and only one specifically to Glasswing.

    Related: AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

    Related: White House Chief of Staff to Meet With Anthropic CEO Over Its New AI Technology

    Chinese claims Claude Comparisons Cybersecurity Draw firms hacking Mythos
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleUbersuggest Chrome Extension 2.0: Keyword Research Tool
    Next Article Mi Fitness (Xiaomi Wear) 3.53.1i by Beijing Xiaomi Mobile Software Co.,Ltd
    admin
    • Website

    Related Posts

    In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    April 24, 2026

    US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

    April 24, 2026

    FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

    April 24, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    April 24, 2026

    California Coastal Community Must Reject CBP’s AI-Powered Surveillance Tower

    April 24, 2026

    Why Microsoft’s AI Ad Strategy Deserves More Attention From PPC Managers

    April 24, 2026

    Amazon eero and Leo routers escape the FCC’s foreign router ban

    April 24, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,492)
    • Privacy & Online Earning (182)
    • SEO & Digital Marketing (917)
    • Tech Tools & Mobile / Apps (1,778)
    • WiFi / Internet & Networking (244)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    April 24, 2026

    California Coastal Community Must Reject CBP’s AI-Powered Surveillance Tower

    April 24, 2026

    Why Microsoft’s AI Ad Strategy Deserves More Attention From PPC Managers

    April 24, 2026
    Most Popular
    • In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device
    • California Coastal Community Must Reject CBP’s AI-Powered Surveillance Tower
    • Why Microsoft’s AI Ad Strategy Deserves More Attention From PPC Managers
    • Amazon eero and Leo routers escape the FCC’s foreign router ban
    • US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
    • How to track (and grow) AI engine citations
    • Samsung finally fixes document scanning on the Galaxy S25
    • FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.