frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Mythos is the best cybersecurity news in a decade

https://sfstandard.com/opinion/2026/05/06/mythos-cybersecurity-ai/
35•littlexsparkee•8h ago

Comments

littlexsparkee•8h ago
https://archive.ph/B2Ztd
fpj•8h ago
Like seems to be broken, this one worked for me: https://sfstandard.com/opinion/2026/05/06/mythos-cybersecuri...
littlexsparkee•8h ago
Oops, sorry - orig was double pasted and it won't let me edit :/
k310•7h ago
You can ask admins to post-edit.

hn@ycombinator.com

littlexsparkee•7h ago
Thanks, reached out
swapnakm15•8h ago
Yes link not working. Need deep dive to know more on Mythos.
immanuwell•8h ago
[flagged]
dang•1h ago
According to our software (which is, of course, imperfect), your account has repeatedly been posting AI-generated and/or AI-edited comments. If so, can you please stop? It's not allowed here, and will eventually get your account banned.

(See https://news.ycombinator.com/newsguidelines.html#generated and https://news.ycombinator.com/item?id=47340079.)

raffael_de•1h ago
no, it's not. it's a tool in a zero sum game. a competitive imbalance. an exclusive moat. it's not improving anything, it's shifting power.
warkdarrior•1h ago
As long as it shifts the zero-sum game in the favor of the defender, it is improving things.
HDBaseT•1h ago
In a technical sense, I assume the defender means cybersecurity companies, open source developers, etc?

In a physical sense, Anthropic is giving access to who we believe are the "defenders", aka the United States DoD and Israel.

Salgat•30m ago
I disagree. Assuming code complexity is roughly fixed, more sophisticated code analysis will result in a smaller surface area for bugs. Bugs will still be found, but there will be less bugs to be found and less opportunities to exploit.
wslh•12m ago
I'd expect the bigger shift to be toward secure-by-construction building blocks: less custom code that needs to be audited from scratch, and more hardened or verified components where common bug classes are already designed out.
MostlyStable•1h ago
>What if finding every vulnerability in a piece of software were just as fast and easy as finding a few of them, thanks to automation?

This presumes there is such a thing as "every" vulnerability. It is possible that ever more sophisticated, complicated, and abstract attacks become possible/discoverable as one applies more intelligence to the problem.

IF it is indeed possible to make a piece of software completely secure, then yes, more intelligent systems make the situation better, because it will always be possible to audit a system before it is ever released and make it completely safe.

That is a very big if and, as far as I am aware, remains to be seen if it's the case

-edit- They mention this possibility themselves further down, so the authors know this is a completely speculative point/article. They don't even try to make an argument about why one possibility might be more likely than the other. This article is useless.

schoen•39m ago
We know about physical-layer attacks that break some of the abstractions that software relies on, allowing an attacker to use physical access or physical proximity to violate security guarantees that are enforced by software alone. (I worked on some of these a while ago!)

For a purely remote attacker (although maybe we have to get clear on what distance counts as "physical proximity" because we need to clarify what phenomena spy satellites, for example, can observe), it seems pretty straightforward to me that there is such a thing as actually secure software.

You can make a very strong model of what the software computes and then prove that it never does some undesired thing. It's not common to do this at all, and even formal verification work may not use very strong models or models that capture some important part of the behavior, but it is possible to mathematically reason about what software does and doesn't or can and can't do.

To summarize some of the problems that I partly just mentioned (in no particular order)

(1) We may not have the will, the skill, or the economic demand to make software secure in a very strong sense.

(2) Attackers may subvert our infrastructure or organizations so that we don't actually apply the processes or controls, or run the software, that we expect.

(3) Physical proximity (for active or passive attacks) might sometimes include distances that are actually attainable for attackers. Maybe there are passive or active attacks involving lasers that can be mounted from multiple kilometers away, as an example. In that case most software users might not be able to be sufficiently isolated from the attackers to be protected against those attacks.

(4) Software or hardware other than the specific software whose security we're talking about might be compromised in its supply chain in a way that people don't have a plan, or resources, to detect or mitigate.

(5) Some systems might be compositionally insecure (their pieces might be secure in some relevant model, but the pieces might interact in a way that isn't secure overall, for example related to timing and concurrency problems).

(6) Our proofs of security for cryptosystems rely on unproven hardness assumptions for various primitives, some of which might turn out to be wrong.

(7) Some security properties, especially related to communications security, might be inherently unattainable even with correct software. For example, there's an argument that Roger Dingledine (Tor lead developer) once told me about that implies that no anonymity system is perfectly secure in the long run against a very powerful active adversary, unless the system is willing to make extreme trade-offs like shutting down completely in response to any attack. So it might be that we can't actually build any useful communications system that can absolutely guarantee perfect traffic analysis resistance, essentially because of inherent architectural trade-offs.

But I don't want to lose sight of the idea that you can actually meaningfully reason about what software does and so there is such a thing as the software being correct or incorrect, relative to some specification or goal for its behavior, and correct software actually does exist (which computes correct outputs for every input).

altruios•22m ago
to say that defense doesn't win in the limit is the same thing as saying there is an attack that can not be defended against.

So to re-phase the question to more clearly have an answer: does there exist an attack which no one will ever be able (for all time) to come up with a defense against? (the very existence of such an attack would end the (open) internet, wholly and completely, if the only winning move is not to play...)

There will be an exhaustion of possibilities in the end. New attacks eventually run out after each surface area is hardened against those attacks.

In the limit, defense wins.

There is only one case (that i see) where this may fail. if there is a 'predicament' with the state of security: ie, if securing against attack A requires you to be insecure against attack B and vise versa (this could be a 'whack-a-mole with many different kinds of attacks' situation). But that would be 'provable'. So if such a case exists, we will know about it. And it may be true that predicaments like this could be exercised if they even can exist, we might still be able to avoid/mitigate them.

So large bets on defense winning in the end.

deadbabe•1h ago
Why are we worried about vulnerabilities in code when AI powered social engineering will make it fast, easy, and even fun to find vulnerabilities through human interaction, faster and more deeply than ever?
beachy•1h ago
Because having humans in the loop slows things down, much faster if the attacker can break into the system directly.
spydum•1h ago
We are replacing those with AI agents anyways. It'll be AI agents all the way down!
gyanchawdhary•24m ago
@deadbabe 100%
robocat•23m ago
Code vulnerabilities can be attacked industrially at scale by smaller groups.

Social engineering requires a lot more organisation from attackers.

malwrar•1h ago
Mythos is good for cybersecurity simply because now executives can’t just tell people that only superhackers can break their stuff, as people wouldn’t believe them now anyways.

Infosec for decades has been 99% “hey I found some low-hanging fruit” only to get treated like a liability by the company you report it to, if you got acknowledgment at all. Because of Mythos though, now Artificial Superhumans can find these same vulns, and anyone could be running such an intelligence! Even better, the rich untouchable people operating this particular Artificial Superhuman can’t just be suppressed or ignored by the other set of rich untouchable people that have routinely not cared in the past. So long as it makes anthropic money, maybe we’ll actually see actual improvements in security!

cyanydeez•1h ago
Did you just assume every hacker has all the source code in the world?
axoltl•52m ago
Hi, security professional here! A lot of the time, we don't need it.
blueg3•44m ago
Most software in the world has little novelty. You don't really need the source code.
_jackdk_•39m ago
The "open source movement" has proven reasonably effective over the past few decades.
throwaway-away•35m ago
If you only rely only on stecurity through obscurity (eg attackers not having the source code) you gonna have a bad time. And even if your source code is not available, you can make a good guess about their dependencies. Find a vulnerability there and chances are your software is also vulnerable.
ralph84•17m ago
LLMs are very good at reverse engineering binaries. You just have to convince them you're doing defensive security not offensive so they comply.
xyzzy123•14m ago
I don't see that it makes much difference until we know the distribution of issues that Mythos finds and how reliably it discovers them? Vulns from inspection are discovered via a stochastic process of someone looking at the code, knowing about bug classes and paying sufficient attention to notice them. That's still the case.

IMHO the main thing thats interesting about AI assisted bug hunting is that it changes the balance of power from people who had a lot of free time & attention to the state and big business, who have money and frontier model access.

lprimeisafk•1h ago
Why does it feel like this was written by AI?
landr0id•1h ago
Mythos hacked the site, wrote, and published the article
paulddraper•30m ago
IDK, 12 em dashes?
u_fucking_dork•1h ago
On the other hand Mythos is currently vapor and a marketing stunt
gerdesj•1h ago
... or it riffs with your nick and rhymes with stunt.
enraged_camel•1h ago
If it is "vapor" then how are the various mega corps able to use the preview release? Do you think they are all in on some giant conspiracy?
u_fucking_dork•1h ago
Or they are all riding the hype train and pumping AI just as much as always, lest we forget when Sam did this with GPT-5
mrcwinn•42m ago
Sure, unnecessary widespread investor fraud right before an IPO. Really smart.
threecheese•48m ago
Maybe, but they’ve got everyone scared shitless. My entire org (30k employees, not just engineers) is in sprint 2 of a remediation effort, where we are systematically fixing every high+ finding across hundreds of workloads with decades of system bloat.

I’ve never seen us so aligned on a goal! Wiz is doing pretty well for itself also…

blueg3•43m ago
It's not vapor if people actually have access to it, which they do.
caycep•1h ago
wasn't there a post by someone that looked into the Mythos demo and felt that it was terrible at doing what people claimed it could do?

Granted, given that most cybersecurity news over the past decade has been grim, both could be true...

int32_64•53m ago
There will probably be congressional hearings when it turns out Lazarus Group had access, and then the USG will use it as an excuse to lock AI behind harsh KYC.

https://x.com/kevinakwok/status/2049984076141281482

1a527dd5•53m ago
Mythos has been a boon for "look busy" work. My global corp org has been on a bender upgrading everything, patching everything. There is a giant dashboard that shows green/red for everything we have.

I think it's a total overreaction. But the edict was passed down, and here we are go.

zzzoom•1m ago
Copy Fail was found using AI and made our last week miserable (thanks RedHat). Anyone with access to a SOTA model can point it at any package in your stack and go fish. You're underreacting.

Valve releases Steam Controller CAD files under Creative Commons license

https://www.digitalfoundry.net/news/2026/05/valve-releases-steam-controller-cad-files-under-creat...
923•haunter•7h ago•308 comments

UK businesses brace for jet fuel rationing

https://bmmagazine.co.uk/news/uk-jet-fuel-shortage-rationing-goldman-sachs-warning/
25•OgsyedIE•33m ago•3 comments

Appearing productive in the workplace

https://nooneshappy.com/article/appearing-productive-in-the-workplace/
593•diebillionaires•7h ago•232 comments

Vibe coding and agentic engineering are getting closer than I'd like

https://simonwillison.net/2026/May/6/vibe-coding-and-agentic-engineering/
311•e12e•8h ago•336 comments

Google Cloud fraud defense, the next evolution of reCAPTCHA

https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-fraud-defense-t...
171•unforgivenpasta•5h ago•154 comments

From Supabase to Clerk to Better Auth

https://blog.val.town/better-auth
175•stevekrouse•6h ago•101 comments

The bottleneck was never the code

https://www.thetypicalset.com/blog/thoughts-on-coding-agents
467•Anon84•2d ago•310 comments

Learning the Integral of a Diffusion Model

https://sander.ai/2026/05/06/flow-maps.html
69•benanne•4h ago•15 comments

David Sacks crashed and burned in the White House

https://www.theverge.com/column/925487/david-sacks-trump-administration-ai-model-review
35•PhotonHunter•42m ago•8 comments

Show HN: Tilde.run – Agent sandbox with a transactional, versioned filesystem

https://tilde.run/
113•ozkatz•7h ago•89 comments

Inkscape 1.4.4

https://inkscape.org/doc/release_notes/1.4.4/Inkscape_1.4.4.html
175•s1291•3h ago•35 comments

Show HN: Hallucinopedia

http://halupedia.com/
102•bstrama•6h ago•110 comments

A Theory of Deep Learning

https://elonlit.com/scrivings/a-theory-of-deep-learning/
99•elonlit•1d ago•24 comments

Ted Turner has died

https://www.cnn.com/2026/05/06/us/ted-turner-death
201•pseudolus•8h ago•159 comments

Show HN: PHP-fts – Full-text search engine in pure PHP, no extensions

https://github.com/olivier-ls/php-fts
19•asmodios•2h ago•5 comments

Community firmware for the Xteink X4 e-paper reader

https://github.com/crosspoint-reader/crosspoint-reader
23•dmos62•1d ago•5 comments

Show HN: I built an open-source email builder, alternative to Beefree/Unlayer

https://play.templatical.com
83•oahmadov•7h ago•21 comments

Knitting bullshit

https://katedaviesdesigns.com/2026/04/29/knitting-bullshit/
418•ColinEberhardt•18h ago•177 comments

Multi-stroke text effect in CSS

https://yuanchuan.dev/multi-stroke-text-effect-in-css
325•cheeaun•18h ago•41 comments

Higher usage limits for Claude and a compute deal with SpaceX

https://www.anthropic.com/news/higher-limits-spacex
334•meetpateltech•7h ago•262 comments

Reverse-engineering the 1998 Ultima Online demo server

https://draxinar.github.io/articles/2026-05-01-uodemo-reverse-engineering.html
223•notsentient•16h ago•60 comments

Setting up a Sun Ray server on OpenIndiana Hipster 2025.10

https://catstret.ch/202605/srss-hipster202510/
119•jandeboevrie•12h ago•43 comments

Apple is enforcing an old App Store rule against a new kind of software

https://adaptivesoftware.substack.com/p/the-wrapper-and-the-code
36•iristenteije•1h ago•8 comments

What makes a good smartphone camera?

https://cadence.moe/blog/2026-05-05-what-makes-a-good-smartphone-camera
66•zdw•1d ago•50 comments

Batteries Not Included, or Required, for These Smart Home Sensors

https://coe.gatech.edu/news/2026/04/batteries-not-included-or-required-these-smart-home-sensors
189•gnabgib•3d ago•82 comments

Coverage Cat (YC S22) Seeks Fractional Engineer to Build AI Growth Toolkit

https://www.coveragecat.com/careers/engineering/fractional-growth-engineer
1•botacode•11h ago

Building my own Vi text editor in BASIC

https://leetusman.com/nosebook/yvi
5•zeech•1d ago•0 comments

Mickey Mouse is watching you: Disneyland deploys facial recognition

https://www.theguardian.com/us-news/2026/apr/28/disneyland-entrance-facial-recognition
24•Cider9986•2h ago•3 comments

Virtual violin produces realistic sounds

https://news.mit.edu/2026/mit-engineers-virtual-violin-produces-realistic-sounds-0429
70•gmays•3d ago•59 comments

Life During Class Wartime

https://www.tbray.org/ongoing/When/202x/2026/05/03/Life-During-Class-Wartime
167•AndrewDucker•6h ago•136 comments