Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Cybersecurity Firm’s AI Claims Rival Top Models

Chinese Cybersecurity Firm’s AI Claims Rival Top Models

Posted on April 23, 2026 By CWS

A prominent Chinese cybersecurity company has announced that its AI-driven vulnerability discovery capabilities are comparable to those associated with the newly introduced Claude Mythos model by Anthropic.

Claims Analyzed by Notable Researchers

The assertions made by the Chinese firm have been scrutinized by Eugenio Benincasa, a cybersecurity researcher at ETH Zurich specializing in Chinese technology, as outlined in a post on the Natto Thoughts blog. According to Anthropic, their Mythos model has independently identified thousands of vulnerabilities. This model is kept from public access and is limited to select major organizations through Project Glasswing to prevent misuse.

Anthropic’s CEO has indicated that similar performance levels could be achieved by open-source models and Chinese developers within six to twelve months, a sentiment shared by researchers from cloud security firm Wiz.

Details of the Chinese AI System

The 360 Digital Security Group from 360 Security Technology (Qihoo 360), one of China’s leading cybersecurity firms, claims their AI system, the ‘Multi-Agent Collaborative Vulnerability Discovery System,’ played a crucial role in their success at the Tianfu Cup, a significant hacking competition in China.

According to the company, this system was responsible for identifying around half of the vulnerabilities they discovered during the contest, totaling nearly 1,000, with more than 50 categorized as high-severity across various platforms, including Windows, Microsoft Office, Android, and IoT devices.

Controversy and Comparative Analysis

One of the standout claims involves the identification of CVE-2026-32190, a critical vulnerability in Microsoft Office, which 360 Security asserts their AI detected within minutes, despite being undetected for eight years. Another claim regarding a Windows kernel vulnerability has been contested, as Microsoft attributes that discovery to researchers from Taiwan and South Korea.

Benincasa advises caution, noting that while 360’s AI appears advanced, it does not yet match the comprehensive reasoning capabilities of Claude Mythos. A more fitting comparison might be Google’s Big Sleep, which enhances specific stages of vulnerability research rather than functioning as a fully autonomous system.

Importantly, Benincasa highlights that Chinese laws require private firms and researchers to report vulnerabilities to government bodies before public disclosure, thereby funneling elite security research into state intelligence, potentially giving China an edge over Western nations.

Future Outlook and Implications

Beyond Anthropic’s internal claims, other organizations like Mozilla and Palo Alto Networks have reported substantial benefits from Mythos in identifying vulnerabilities. However, only a limited number of public CVEs have been attributed to Anthropic, and just one to Glasswing.

As technology advances, the interplay between AI-driven cybersecurity tools and international regulations will continue to shape the landscape, offering both challenges and opportunities for global cybersecurity efforts.

Security Week News Tags:360 Digital Security, AI, Anthropic, China, Claude Mythos, Cybersecurity, ETH Zurich, Research, Technology, Tianfu Cup, vulnerability discovery

Post navigation

Previous Post: AI Model Unveils Software Flaws, Raises Fixing Concerns
Next Post: New Malware Targets MacOS to Steal Cryptocurrency

Related Posts

US Targets North Korea’s Illicit Funds: M Rewards Offered as American Woman Jailed in IT Worker Scam US Targets North Korea’s Illicit Funds: $15M Rewards Offered as American Woman Jailed in IT Worker Scam Security Week News
North Korean Hackers Linked to Massive Polyfill Attack North Korean Hackers Linked to Massive Polyfill Attack Security Week News
Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims Security Week News
Russian Government Hackers Caught Buying Passwords from Cybercriminals Russian Government Hackers Caught Buying Passwords from Cybercriminals Security Week News
Google Rolls Out Emergency Chrome Update to Patch Zero-Days Google Rolls Out Emergency Chrome Update to Patch Zero-Days Security Week News
766,000 Impacted by Data Breach at Dealership Software Provider Motility 766,000 Impacted by Data Breach at Dealership Software Provider Motility Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration
  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration
  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark