Image created with gemini-3.1-flash-image-preview with claude-opus-4.7. Image prompt: Using the provided reference image, preserve every element exactly — the marigold orange backdrop, the seated woman with closed eyes and faint smile in her purple-and-white windbreaker, the tattooed man in the red beanie and layered red vest leaning in to serenade her, the studio lighting and shallow depth of field — but replace only the black microphone in his hand with a heavy brass padlock held the same way at the same angle to his mouth, its curved shackle facing upward near his lips, rendered photographically with realistic worn metal texture and matching warm light integration. After generating the image, overlay the text “Security” in the upper-left corner of the frame in large, bold, all-caps ITC Avant Garde Gothic Pro Medium (or a near-identical geometric sans-serif if unavailable), pure white (#FFFFFF), with no date, subtitle, drop shadow, or outline. The text should be substantial in scale — taking up a meaningful portion of the upper-left area — with comfortable margin from the top and left edges, set against the negative space of the orange backdrop so it does not overlap or obscure the singer, the seated woman, or the replaced object.
So the concern over Mythos and cybersecurity seems warranted.
https://x.com/emollick/status/2043810051979157680
This was… an interesting one. Reminder that we run independent evals on our cyber ranges that labs don’t have access to. Exploitation capabilities are getting seriously good. Mythos is the first model to complete our full 32-step corporate network attack sim E2E.
https://x.com/ekinomicss/status/2043688793085992970
– – Sam Altman – Attacks
https://blog.samaltman.com/2279512
Suspect in Molotov cocktail attack on Sam Altman’s home identified | The San Francisco Standard
https://sfstandard.com/2026/04/10/sam-altman-russian-hill-molotov-cocktail/
Trusted access for the next era of cyber defense | OpenAI
https://openai.com/index/scaling-trusted-access-for-cyber-defense/
A few weeks ago, it was common to hear people argue one should use agents to replace dependencies for security reasons. In light of the Mythos news, the math changes. Using an OSS lib that’s had tens of thousands of $ of agentic hardening is likely optimal.
https://x.com/dbreunig/status/2043762702653460520
I am catching glimpses in my feed that there is a backlash against Mythos as “”marketing hype,”” and it is a little confusing. I don’t think anyone who has used the latest agentic coding tools, would think that expecting large-scale cybersecurity implications of increasingly good
https://x.com/emollick/status/2043516250081407422
Marcus Hutchins, the guy famous for stopping the WannaCry Ransomware, probably has the best take on Mythos doing vulnerability research
https://x.com/ananayarora/status/2043381424594837789
The Mythos Threshold – Joe Reis
https://joereis.substack.com/p/the-mythos-threshold
What I learned this week – Pretraining parallelisms, Can distillation be stopped, Mythos and the cybersecurity equilibrium, Pipeline RL, On why pretraining runs fails
https://www.dwarkesh.com/p/what-i-learned-april-15
Jensen Huang – TPU competition, why we should sell chips to China, & Nvidia’s supply chain moat
https://www.dwarkesh.com/p/jensen-huang
The Jensen Huang episode. 0:00:00 – Is Nvidia’s biggest moat its grip on scarce supply chains? 0:16:25 – Will TPUs break Nvidia’s hold on AI compute? 0:41:06 – Why doesn’t Nvidia become a hyperscaler? 0:57:36 – Should we be selling AI chips to China? 1:35:06 – Why doesn’t Nvidia
https://x.com/dwarkesh_sp/status/2044456498441708013
We’re expanding Trusted Access for Cyber with additional tiers for authenticated cybersecurity defenders. Customers in the highest tiers can request access to GPT-5.4-Cyber, a version of GPT-5.4 fine-tuned for cybersecurity use cases, enabling more advanced defensive workflows.
https://x.com/OpenAI/status/2044161906936791179
Securing non-human identities: automated revocation, OAuth, and scoped permissions
https://blog.cloudflare.com/improved-developer-security/





Leave a Reply