Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Anthropic Unveils Enhanced Claude Sonnet 4.6 Model

Anthropic Unveils Enhanced Claude Sonnet 4.6 Model

Posted on February 18, 2026 By CWS

Anthropic’s Latest AI Model Launch

Anthropic has introduced Claude Sonnet 4.6, showcasing significant advancements in coding, computer usage, and extended reasoning capabilities. This model enhances agent planning, knowledge tasks, and design, all while maintaining the same pricing as previous versions.

The model is now integrated into the Free and Pro plans on platforms like claude.ai and Claude Cowork, with API pricing solidified at $3/$15 per million input/output tokens. A standout feature of Sonnet 4.6 is its beta 1 million token context window, adept at managing entire codebases and extensive documents.

Coding Performance and User Preference

Developers have shown a strong preference for Sonnet 4.6, with 70% favoring it over its predecessor, Sonnet 4.5, due to improved context comprehension and minimized code duplication. The model also outperformed Anthropic’s Opus 4.5 in terms of reduced overengineering and better task consistency.

On the SWE-bench Verified benchmark, Sonnet 4.6 achieved a score of 79.6%, edging closer to Opus 4.6’s 80.8% and marking the narrowest performance gap between the Sonnet and Opus models thus far. Users noted remarkable improvements in frontend code and financial analysis, highlighting its enhanced design and fewer iterations needed for production-ready results.

Advancements in Computer Use

Claude Sonnet 4.6 marks a significant leap in autonomous computer use, scoring 72.5% on the OSWorld-Verified benchmark, nearly matching Opus 4.6 and significantly outperforming GPT-5.2. This represents a substantial increase from the initial 14.9% score when the feature was first introduced.

Early adopters report that Sonnet 4.6 exhibits human-level proficiency in complex tasks such as spreadsheet navigation and managing multi-step web forms. The model’s resistance to prompt injection attacks has seen improvements, placing it on par with Opus 4.6 in safety evaluations.

Platform Enhancements and Integration

The Claude Developer Platform sees upgrades with Sonnet 4.6, supporting adaptive and extended thinking, alongside context compaction in beta. This feature aids in summarizing older context as conversation limits approach. Additionally, web search and fetch tools now utilize dynamic code execution for better response quality and token efficiency.

The Claude in Excel add-in has expanded capabilities, now supporting MCP connectors for integration with platforms like S&P Global and LSEG. Available across Pro, Max, Team, and Enterprise plans, Claude Sonnet 4.6 is accessible on major cloud platforms, including Microsoft Azure AI Foundry, with API access via the model string ‘claude-sonnet-4-6’.

For ongoing updates in cybersecurity and AI technology, follow Anthropic on Google News, LinkedIn, and X. Reach out to us for opportunities to feature your stories.

Cyber Security News Tags:AI development, AI model, Anthropic, API, Claude Sonnet, cloud platforms, Coding, computer use, model upgrade, Software, Technology

Post navigation

Previous Post: Phishing Scam Targets Booking.com Users in Fraud Scheme
Next Post: Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Related Posts

500+ Apache Tika Toolkit Instances Vulnerable to Critical XXE Attack Exposed Online 500+ Apache Tika Toolkit Instances Vulnerable to Critical XXE Attack Exposed Online Cyber Security News
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News
New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies Cyber Security News
Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News
Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions Cyber Security News
Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kickstart Your Intelligent Workflow Program with 3 Key Strategies
  • MetaMask Phishing Scam Uses Fake Security Reports
  • Cogent Secures $42M to Enhance AI for Vulnerability Management
  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News