Chaos
You must login to view this content
You must login to view this content
Anthropic's leaked model made headlines this week. But the real story is what current AI models can already do to your inbox.
The post Anthropic’s Mythos leak is a wake-up call: Phishing 3.0 is already here appeared first on Security Boulevard.
You must login to view this content
On March 26, Anthropic confirmed the existence of Claude Mythos, an unreleased AI model described internally as "a step change" in capabilities, after a data leak exposed approximately 3,000 unpublished assets in a publicly searchable, unencrypted data store (Fortune, March 26, 2026). The leak was not a sophisticated intrusion. A toggle switch in Anthropic's content management system was left in the wrong position, setting digital assets to public by default (Fortune, March 26, 2026). Among the exposed materials were internal assessments describing Mythos as posing "unprecedented cybersecurity risks" and being "far ahead of any other AI model in cyber capabilities" (World Today News, March 2026).
The post Claude Mythos and the Cybersecurity Risk That Was Already Here appeared first on Security Boulevard.
The RSAC conference has once again descended upon San Francisco and delivered an event that brings together the largest collection of industry leaders, technologies, and cybersecurity community events!
Over the course of several days, attendees accessed exceptional keynotes, thought-leading expert sessions, and an unmatched technology expo. During the evenings, there were countless private events, get-togethers, and parties to entertain.
RSAC has been a cornerstone of the cybersecurity industry, and professionals around the globe continue to flock to the event. Other conferences attempt to emulate RSAC because of its meaningfulness and draw to the community.
The sheer number of tracks and sessions was as impressive as the experts who came to lead those discussions. The keynotes were top-notch, providing a rare glimpse into the insights from top organizations, reflecting the concerns of the broader industry.
The expo floor is something else. It is a slice of Vegas, with over-the-top booths, showmanship, and flash. This is where vendors are not just showing their wares, but actually race to complete new features and innovations, just to show at the expo. This is where the cutting-edge cybersecurity tools, products, and services emerge.
It is easy to get turned around in the subterranean sprawl housing hundreds of booths. The competition for attention is fierce, sometimes rising to a cringeworthy spectacle, with the showmanship of an entertainment venue! Walking the floor, I saw Virtual Reality experiences, carnival games, and all manner of interactive displays. The wrestling ring with ‘wrestlers’ squaring off against ransomware drew lots of attention.
I believe the biggest draw for RSAC comes down to the community. It is the discussions, engagements, and in-person opportunities to reinforce peer networks and collaborate with colleagues that bring the crowds every year. Beyond the tech and swag, cybersecurity is rooted in the people who strive against the odds to successfully manage risk. We all rely upon our network of friends and associates in the journey. RSAC brings so many of them together to learn, reinforce bonds, and inspire one another.
The relationships forged and reinforced will endure long after the booths are torn down. Ultimately, it is the strength of the cybersecurity community that determines our success.
See you all next time!
The post RSAC Focuses Cybersecurity Insights, Tech, and Community in One Place appeared first on Security Boulevard.
Author, Creator & Presenter: Connor Turpin - Cloud Architect And Sysadmin
Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations' YouTube Channel.
The post BSidesSLC 2025 – LLM-Assisted Risk Management For Small Teams & Budgets appeared first on Security Boulevard.
A purpose-built cybersecurity LLM is trained on security data from the ground up — not a general-purpose model with a security prompt. Here's why the architecture matters for SOC operations.
The post GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can. appeared first on D3 Security.
The post GPT Can’t Trace an Attack Chain. A Purpose-Built Cybersecurity LLM Can. appeared first on Security Boulevard.
You must login to view this content
You must login to view this content
We just launched something we've wanted to do for a long time.
The post Best of the Worst: Weekly Phishing Attack Recap | IRONSCALES appeared first on Security Boulevard.
The FBI said it was aware of hackers targeting Patel’s personal email, and that no government information was taken.
The post Iranian hackers, Handala, claim to compromise FBI Director Kash Patel’s personal data appeared first on CyberScoop.