Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Anthropic Unveils Enhanced Claude Sonnet 4.6 Model

Anthropic Unveils Enhanced Claude Sonnet 4.6 Model

Posted on February 18, 2026 By CWS

Anthropic’s Latest AI Model Launch

Anthropic has introduced Claude Sonnet 4.6, showcasing significant advancements in coding, computer usage, and extended reasoning capabilities. This model enhances agent planning, knowledge tasks, and design, all while maintaining the same pricing as previous versions.

The model is now integrated into the Free and Pro plans on platforms like claude.ai and Claude Cowork, with API pricing solidified at $3/$15 per million input/output tokens. A standout feature of Sonnet 4.6 is its beta 1 million token context window, adept at managing entire codebases and extensive documents.

Coding Performance and User Preference

Developers have shown a strong preference for Sonnet 4.6, with 70% favoring it over its predecessor, Sonnet 4.5, due to improved context comprehension and minimized code duplication. The model also outperformed Anthropic’s Opus 4.5 in terms of reduced overengineering and better task consistency.

On the SWE-bench Verified benchmark, Sonnet 4.6 achieved a score of 79.6%, edging closer to Opus 4.6’s 80.8% and marking the narrowest performance gap between the Sonnet and Opus models thus far. Users noted remarkable improvements in frontend code and financial analysis, highlighting its enhanced design and fewer iterations needed for production-ready results.

Advancements in Computer Use

Claude Sonnet 4.6 marks a significant leap in autonomous computer use, scoring 72.5% on the OSWorld-Verified benchmark, nearly matching Opus 4.6 and significantly outperforming GPT-5.2. This represents a substantial increase from the initial 14.9% score when the feature was first introduced.

Early adopters report that Sonnet 4.6 exhibits human-level proficiency in complex tasks such as spreadsheet navigation and managing multi-step web forms. The model’s resistance to prompt injection attacks has seen improvements, placing it on par with Opus 4.6 in safety evaluations.

Platform Enhancements and Integration

The Claude Developer Platform sees upgrades with Sonnet 4.6, supporting adaptive and extended thinking, alongside context compaction in beta. This feature aids in summarizing older context as conversation limits approach. Additionally, web search and fetch tools now utilize dynamic code execution for better response quality and token efficiency.

The Claude in Excel add-in has expanded capabilities, now supporting MCP connectors for integration with platforms like S&P Global and LSEG. Available across Pro, Max, Team, and Enterprise plans, Claude Sonnet 4.6 is accessible on major cloud platforms, including Microsoft Azure AI Foundry, with API access via the model string ‘claude-sonnet-4-6’.

For ongoing updates in cybersecurity and AI technology, follow Anthropic on Google News, LinkedIn, and X. Reach out to us for opportunities to feature your stories.

Cyber Security News Tags:AI development, AI model, Anthropic, API, Claude Sonnet, cloud platforms, Coding, computer use, model upgrade, Software, Technology

Post navigation

Previous Post: Phishing Scam Targets Booking.com Users in Fraud Scheme
Next Post: Dell RecoverPoint VMs Vulnerability Exploited Since 2024

Related Posts

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities Cyber Security News
New Frontiers In Identity-Based Access Control New Frontiers In Identity-Based Access Control Cyber Security News
TeamViewer DEX Vulnerabilities Let Attackers Trigger DoS Attack and Expose Sensitive Data TeamViewer DEX Vulnerabilities Let Attackers Trigger DoS Attack and Expose Sensitive Data Cyber Security News
Top 10 Best Data Removal Services In 2026 Top 10 Best Data Removal Services In 2026 Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News
Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure
  • Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse
  • Security Risks in Popular VS Code Extensions Identified
  • CISA Urges Action on Windows ActiveX RCE Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Navigating Cybersecurity Amidst Constant Instability
  • Critical Zero-Day Flaws in PDF Software Risk Data Exposure
  • Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse
  • Security Risks in Popular VS Code Extensions Identified
  • CISA Urges Action on Windows ActiveX RCE Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News