Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Researchers use Anthropic Mythos find flaws in Apple security; ‘hack’ MacOS

Researchers use Anthropic Mythos find flaws in Apple security; ‘hack’ MacOS

Researchers use Anthropic Mythos find flaws in Apple security; ‘hack’ MacOS

https://etimg.etb2bimg.com/thumb/msid-131114400,imgsize-1285067,width-1200,height=627,overlay-etciso,resizemode-75/vulnerabilities-exploits/researchers-use-anthropic-mythos-find-flaws-in-apple-security-hack-macos.jpg

Anthropic’s Mythos AI, a tool that has already rattled the tech and financial sectors by exposing widespread software vulnerabilities, has now successfully ‘hacked’ macOS, which is regarded as one of the most secure operating systems in the world. According to a report by The Wall Street Journal, researchers claimed to have used Mythos to uncover deep-rooted security flaws that had remained hidden until now. The breakthrough was significant and the Palo Alto-based researchers who led the test reportedly drove straight to Apple’s headquarters in Cupertino to hand-deliver their findings.

How Mythos ‘hacked’ Apple’s macOS

What makes this discovery alarming is not just that the AI tool found a bug but how it thought through the problem. Mythos didn’t rely on a single mistake in Apple’s code, and instead, it performed a “chained attack.” The AI identified two separate, minor bugs in the macOS system and linked them together.

By combining these flaws, Mythos was able to corrupt the Mac’s memory, gaining access to sensitive parts of the device that are supposed to be completely off-limits. The researchers say that if used by hackers, this exploit may allow them to take full control of the victim’s computer, bypassing nearly all of Apple’s built-in security measures.

The ‘Human-AI’ team

While the AI’s ability to find these vulnerabilities is commendable, researchers noted that Mythos didn’t act entirely on its own, and that the ‘hack’ was a collaborative effort between the AI and skilled security professionals. Experts believe that while the AI has an incredible knack for spotting tiny errors in millions of lines of code, it still requires human guidance to execute the final, complex stages of a system takeover.

However, the speed and accuracy with which the AI identified the flaws suggest that “AI-assisted hacking” is increasingly becoming a major threat. Recently, Google claimed that it thwarted an AI-backed hacking campaign.

What Apple has to say

Apple is currently reviewing the data provided by the research team. In a statement to The Wall Street Journal, a spokesperson said, “Security is our top priority, and we take reports of potential vulnerabilities very seriously.”

The tech giant has not yet confirmed if a “patch” or security update has been released to fix the specific holes discovered by Mythos. Most details about the vulnerabilities are being kept secret to prevent other hackers from using the same path before a fix is ready.

  • Published On May 15, 2026 at 04:00 PM IST

Join the community of 2M+ industry professionals.

Subscribe to Newsletter to get latest insights & analysis in your inbox.

All about ETCISO industry right on your smartphone!




Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket