Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Claude Mythos Explained: AI Finding Zero-Day Vulnerabilities and Chaining Exploits

Claude Mythos is an AI model capable of finding and chaining zero-day vulnerabilities at scale. That changes how attacks happen, especially in environments where you can’t patch fast enough. The Forescout 4D Platform with VistaroAI helps organizations respond with real-time visibility and dynamic control across all connected devices.

Stopping AI Agent Attacks: How Falcon AIDR Blocks Prompt Injection

See how attackers can exploit AI agents like OpenClaw using hidden prompt injection techniques—and how CrowdStrike Falcon AIDR stops them in real time. In this demo, we show how a seemingly harmless resume contains invisible malicious instructions that trick an AI agent into leaking sensitive data, including API tokens and system access. Then, we replay the same scenario with Falcon AIDR enabled, where the attack is detected and blocked before any damage is done.

Why API Discovery Is the First Step to Securing AI

AI risk doesn’t live in the model. It lives in the APIs behind it. Every AI interaction triggers a chain of API calls across your environment. Many of those APIs aren’t documented or tracked. That’s your real exposure. Shadow API discovery gives you visibility into those hidden endpoints, so you can find them before attackers do. If you don’t know which APIs your AI relies on, you can’t secure the system.

Explainable AI in Email Security: From Black Box to Clarity

Generative AI and sophisticated social engineering have reshaped the cybersecurity landscape in 2026. Traditional "castle-and-moat" defenses centered on the Secure Email Gateway (SEG) are increasingly pressured by machine-scale attacks designed to bypass static filters. As organizations shift toward Integrated Cloud Email Security (ICES) models, a new technical and psychological barrier appears: the "black box" problem of defensive AI.

This Project Glasswing Announcement is Bigger Than You Think

Anthropic's Project Glasswing and Mythos Preview model represent a seismic shift in cybersecurity. This AI is specifically tuned for vulnerability discovery, code review and security hardening at unprecedented speed. In this episode of Razorwire Raw, Jim Rees breaks down what Project Glasswing actually means for information security professionals and the concerns nobody's talking about yet.

Autonomous AI Agents Explained: Risks, Capabilities & Security Gaps

Autonomous AI agents are no longer experimental—they’re writing code, executing commands, and making decisions in real time. But as AI coding agents become more powerful, they’re also introducing a new and often invisible attack surface. In this video, we break down: AI agents can install packages, run scripts, and modify systems instantly—often without traditional visibility. That means security teams need to rethink how they monitor and protect their environments.

12 Cloud Outages With Catastrophic Effects

There’s no infrastructure that’s always on and immune to all kinds of threats. Even the top providers leave a tiny margin in their Service Level Agreements (SLA), stating 99.999% uptime at most. The cloud, advertised as the universal cure for the problems of legacy on-premises setups, also turned out vulnerable. The most obvious and impactful manifestations of cloud vulnerability are cloud outages.

What Is AI Context Security?

Every enterprise wants to use AI on its most valuable data — customer records, financial documents, clinical notes, legal files, engineering IP. The problem is simple: the moment that data enters an AI workflow, traditional security stops working. Firewalls protect the network. Encryption protects data at rest. Access controls protect the database. But none of them protect what happens when an AI agent retrieves five documents, synthesizes an answer, and delivers it to a user.

Navigating the Post-Mythos Landscape with Bitsight

The rise of AI-driven vulnerability discovery using Anthropic's Claude Mythos, as well as similar tools from Google and OpenAI, is completely changing the calculus of cyber risk. The number of vulnerabilities is exploding. The time it takes for exploits to appear is shrinking. The patching cadences and scan intervals, assessments and risk registers that many organizations still rely on are rapidly becoming ineffective.