{"id":7805,"date":"2026-04-14T16:27:03","date_gmt":"2026-04-14T16:27:03","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7805"},"modified":"2026-04-14T16:27:03","modified_gmt":"2026-04-14T16:27:03","slug":"eu-regulators-largely-denied-access-to-anthropic-mythos","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7805","title":{"rendered":"EU regulators largely denied access to Anthropic Mythos"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>European regulators have largely been frozen out of early access to Anthropic\u2019s new Mythos model,\u00a0<a href=\"https:\/\/www.politico.eu\/article\/anthropic-apple-microsoft-europe-left-in-the-dark-superhacking-ai\/\">Politico reports<\/a>. The AI technology, <a href=\"https:\/\/www.csoonline.com\/article\/4151801\/leak-reveals-anthropics-mythos-a-powerful-ai-model-aimed-at-cybersecurity-use-cases.html\">aimed at cybersecurity use cases<\/a>, is said to be able to identify and exploit technical vulnerabilities at a level that surpasses most humans \u2014 signaling a <a href=\"https:\/\/www.csoonline.com\/article\/4158117\/anthropics-mythos-signals-a-structural-cybersecurity-shift.html\">structural shift for CISOs and the cybersecurity industry<\/a>.<\/p>\n<p>For security reasons, Anthropic has chosen to initially limit access to a <a href=\"https:\/\/www.csoonline.com\/article\/4155342\/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery.html\">few selected players as part of Project Glasswing<\/a>. These include primarily US technology giants such as Apple, Microsoft, and Amazon, who have been <a href=\"https:\/\/www.anthropic.com\/glasswing\">given the opportunity to analyze the model<\/a> and address potential security flaws.<\/p>\n<p>At the same time, European authorities have been largely left out. In the UK, the country\u2019s AI Security Institute has been allowed to <a href=\"https:\/\/www.aisi.gov.uk\/blog\/our-evaluation-of-claude-mythos-previews-cyber-capabilities\">test the model and has already acted on its results<\/a>. Within the EU, only Germany is currently reported to have initiated a dialogue with Anthropic, but without yet gaining access to the technology.<\/p>\n<p>As a result, the EU\u2019s influence over the model is limited, not least because it is not yet widely available. Several experts interviewed by Politico believe that this development is problematic, as private companies in practice decide how and when such powerful technology is shared, rather than independent authorities.<\/p>\n<p>Germany\u2019s chief cybersecurity official <a href=\"https:\/\/www.politico.eu\/article\/german-cyber-agency-braces-for-significant-disruption-from-anthropics-ai-hacking-tech\/\">Claudia Plattner underscored to Politico<\/a> the \u201cpressing\u201d question of whether a tool like Mythos \u201cof such extraordinary power\u201d will be available on the open market.<\/p>\n<p>\u201cThat question, in turn, has profound implications for national and European security and sovereignty,\u201d Plattner said.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>European regulators have largely been frozen out of early access to Anthropic\u2019s new Mythos model,\u00a0Politico reports. The AI technology, aimed at cybersecurity use cases, is said to be able to identify and exploit technical vulnerabilities at a level that surpasses most humans \u2014 signaling a structural shift for CISOs and the cybersecurity industry. For security [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":7806,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7805"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7805"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7805\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/7806"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}