{"id":5208,"date":"2025-10-06T16:36:35","date_gmt":"2025-10-06T16:36:35","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5208"},"modified":"2025-10-06T16:36:35","modified_gmt":"2025-10-06T16:36:35","slug":"claude-sonnet-4-5-marks-anthropics-pivot-toward-ai-powered-cyber-defense","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5208","title":{"rendered":"Claude Sonnet 4.5 Marks Anthropic\u2019s Pivot Toward AI-Powered Cyber Defense"},"content":{"rendered":"<p>Anthropic claims that AI has reached a turning point in cybersecurity, stating that its Claude Sonnet 4.5 model can now detect, analyze, and patch software flaws that were previously handled only by human experts. The company is positioning the system as a front-line tool for defending critical code and infrastructure.<\/p>\n<p>In a new announcement, Anthropic described this as an \u201cinflection point\u201d for AI in cyber defense, citing benchmark gains that show Claude Sonnet 4.5 outperforming earlier models in vulnerability discovery and patching. The company reports that the technology is already being used by partners such as HackerOne and CrowdStrike to accelerate threat detection and strengthen defenses.<\/p>\n<h2 class=\"wp-block-heading\">AI crosses the line from concept to cyber weapon<\/h2>\n<p><a href=\"https:\/\/www.anthropic.com\/research\/building-ai-cyber-defenders\">Anthropic noted<\/a> that the moment marks a shift from experimentation to execution, when <a href=\"https:\/\/www.anthropic.com\/research\/building-ai-cyber-defenders\" target=\"_blank\" rel=\"noopener\">artificial intelligence<\/a> stops being a theoretical aid and becomes part of real-world <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/generative-ai-and-cybersecurity\/\">cyber defense<\/a>.\u00a0<\/p>\n<p>After years of testing models that could simulate breaches, the <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/ai-companies\/\">AI company<\/a> confirmed its systems are now capable of preventing them. Sonnet 4.5 was designed with that goal in mind: scanning code, identifying vulnerabilities, and patching weaknesses before attackers can exploit them.<\/p>\n<p>Anthropic warned that attackers are already using AI to scale their operations. In August, it reported that its own <a href=\"https:\/\/www.techrepublic.com\/article\/news-anthropic-warns-ai-powered-cyber-crime\/\" target=\"_blank\" rel=\"noopener\">Claude models had been misused<\/a> for extortion, fraud, and espionage, a reminder that AI can be turned against itself. According to the company, the only way to close that gap is to speed up the defensive use of AI across industries and infrastructure.<\/p>\n<h2 class=\"wp-block-heading\">Claude Sonnet 4.5 sets new highs on Cybench and CyberGym<\/h2>\n<p>Anthropic\u2019s latest model demonstrates significant progress in tests designed to simulate real-world defense work.<\/p>\n<p>On Cybench, Claude Sonnet 4.5 solved 76.5% of challenges after multiple attempts, a twofold jump in just six months. The benchmark involves complex, multi-step workflows such as analyzing network traffic, extracting malware, and decompiling malicious code, tasks Anthropic says now take the model minutes instead of hours for a skilled human.<\/p>\n<p>Performance also climbed on CyberGym, where Sonnet 4.5 replicated known vulnerabilities in 66.7% of software projects and uncovered new ones in over 33% of cases across repeated trials.\u00a0<\/p>\n<p>The company stressed that its research targets defensive gains only, focusing on detecting and repairing insecure code rather than writing exploits or malware.<\/p>\n<h2 class=\"wp-block-heading\">Early partners put Claude\u2019s defensive skills to the test<\/h2>\n<p>Anthropic stated that organizations have already begun using Claude Sonnet 4.5 in live security environments, reporting measurable gains in speed and accuracy.<\/p>\n<p>At HackerOne, the <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/ai-model-types\/\">AI model<\/a> helped reduce average vulnerability intake time by 44% while improving detection accuracy by 25%, according to Chief Product Officer Nidhi Aggarwal. The company said the improvement allowed its \u201cHai\u201d AI security agents to process reports faster and at a lower risk for clients.<\/p>\n<p>CrowdStrike also tested Claude\u2019s defensive capabilities, noting strong potential for red-teaming and simulating attacker behavior. Chief Scientist Sven Krasser pointed out the model\u2019s creative attack scenarios help researchers study tradecraft more efficiently, strengthening defenses across endpoints, identity, and cloud workloads.<\/p>\n<p>Anthropic added that feedback from these pilots reinforced its confidence that Sonnet 4.5 can complement human analysts and streamline high-volume, repetitive security tasks in enterprise settings.<\/p>\n<h2 class=\"wp-block-heading\">Anthropic eyes safer, smarter AI systems for the next phase<\/h2>\n<p>Anthropic continues to strengthen its own defenses as it expands Claude\u2019s cyber capabilities. Its Safeguards team recently disrupted attempts to weaponize its AI, including a \u201cvibe hacking\u201d extortion scheme and an espionage campaign targeting telecom infrastructure that showed signs of Chinese APT-style tactics.<\/p>\n<p>It is also refining Claude\u2019s ability to generate and review security patches, a complex task that requires fixing vulnerabilities without breaking underlying code. Early results indicate the <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/ai-software\/\">AI tool<\/a>\u2019s earlier gains in vulnerability discovery, suggesting steady progress toward reliable defensive use.<\/p>\n<p>The company\u2019s broader security effort extends beyond Claude Sonnet. Claude Code has been recently <a href=\"https:\/\/www.techrepublic.com\/article\/news-anthropic-claude-code-ai-security-review\/\" target=\"_blank\" rel=\"noopener\">upgraded with an always-on review<\/a> system that automatically flags vulnerabilities, such as SQL injection and cross-site scripting, before code reaches production. With Claude Sonnet 4.5, that same defense-first approach now moves beyond the developer environment to critical infrastructure.<\/p>\n<p>Anthropic closed its statement with a call for collaboration, urging industry, government, and researchers to use AI to make digital infrastructure secure by design. Frontier models like Claude, it said, could play a central role in hardening the systems that keep modern life online.<\/p>\n<p><strong>In some not-so-hot news for Anthropic: A judge <\/strong><a href=\"https:\/\/www.eweek.com\/news\/judge-approves-anthropic-settlement-authors-copyright\/\"><strong>preliminarily accepted a lawsuit<\/strong><\/a><strong> brought by book authors against the tech giant, which accuses the company of using pirated works to train Claude.<\/strong><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/news\/news-anthropic-claude-4-5-cyber-defense-inflection-point\/\">Claude Sonnet 4.5 Marks Anthropic\u2019s Pivot Toward AI-Powered Cyber Defense<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Anthropic claims that AI has reached a turning point in cybersecurity, stating that its Claude Sonnet 4.5 model can now detect, analyze, and patch software flaws that were previously handled only by human experts. The company is positioning the system as a front-line tool for defending critical code and infrastructure. In a new announcement, Anthropic [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-5208","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5208"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5208"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5208\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}