Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      New Wits-built app to warn South Africans of pollution spikes - Bruce Mellado

      New Wits-built app to warn South Africans of pollution spikes

      20 April 2026
      Hype or not, Mythos is a wake-up call for South African CISOs

      Hype or not, Mythos is a wake-up call for South African CISOs

      20 April 2026
      South Africa 'isn't ready' for AI-accelerated cyberattacks - Zaheer Ebrahim

      South Africa ‘isn’t ready’ for AI-accelerated cyberattacks

      20 April 2026
      Specialists leave mobile operators behind on home internet - Vox

      Specialists leave mobile operators behind on home internet

      20 April 2026
      Humanoid robots are now faster than the world's best runners

      Humanoid robots are now faster than the world’s best runners

      20 April 2026
    • World
      Adobe bets on AI agents to fend off cheaper rivals

      Adobe bets on AI agents to fend off cheaper rivals

      16 April 2026
      Google poised to lose ad crown to Meta

      Google poised to lose ad crown to Meta

      14 April 2026
      Grand Theft Data - hackers hit Rockstar Games - Grand Theft Auto

      Grand Theft Data – hackers hit Rockstar Games

      14 April 2026
      UK PM Keir Starmer declares war on doomscrolling

      UK PM Keir Starmer declares war on doomscrolling

      13 April 2026
      Big Tech is going nuclear

      Big Tech is going nuclear

      10 April 2026
    • In-depth
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
    • TCS
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
      TCS+ | Vodacom Business moves to crack the SME tech gap - Andrew Fulton, Sannesh Beharie

      TCS+ | Vodacom Business moves to crack the SME tech gap

      7 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Hype or not, Mythos is a wake-up call for South African CISOs

    Hype or not, Mythos is a wake-up call for South African CISOs

    Whether Anthropic's new Mythos model lives up to the hype or not, South Africa is not prepared for what's coming.
    By Duncan McLeod20 April 2026
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Hype or not, Mythos is a wake-up call for South African CISOs

    Should South African organisations be panicked about Claude Mythos? The answer depends partly on whether the model lives up to its own marketing hype and partly on a set of defensive questions that are going to matter regardless.

    A brief recap: Mythos is the most capable AI model that San Francisco-based Anthropic has built, sitting above the Opus tier, its current flagship. The new model’s existence was revealed in late March when a configuration error in Anthropic’s content management system exposed roughly 3 000 unpublished assets, including a draft blog post describing a model Anthropic said posed “unprecedented cybersecurity risks”.

    The company confirmed the leak, officially announced Claude Mythos Preview on 7 April, and said it would not be releasing the model publicly. Access is being granted via a restricted programme called Project Glasswing to a small group of early-access customers, with a version now being rolled out to US federal agencies.

    Anthropic’s own documents show Mythos developing and using a full Linux kernel exploit

    Anthropic’s own documents show Mythos developing and using a full Linux kernel exploit – the kind of offensive work that used to require senior security talent operating over weeks.

    This is an unusual sequence of events. It is also one that has done more for Anthropic’s enterprise positioning than any advertising campaign could have. TechCentral readers are entitled to some scepticism here: the shape of the story – a capability so dangerous it must be restricted, but not so dangerous that it cannot be sold to useful customers – sounds suspiciously like a marketing stunt. A system misconfiguration that happens to expose exactly the sort of draft blog a marketing team would have published anyway? Read into that what you will.

    Direction of travel

    But that scepticism does not make the underlying trend any less real. Even discounting Anthropic’s own framing, the direction of travel in frontier AI is unambiguous. Whether or not this specific model lives up to the hype, the broader shift is that vulnerability discovery is becoming cheap. And the economics of attack are changing faster than the economics of defence. That’s the real problem – not Mythos, and not any single model.

    Armand Kruger, head of cybersecurity at NEC XON, noted in recent comments to TechCentral that the challenge for chief information security officers (CISOs) is no longer finding vulnerabilities but prioritising and remediating them fast enough. The time to vulnerability discovery is being compressed with each advancing AI model.

    Read: Anthropic’s Mythos is the cyberthreat every CISO feared

    And let’s not sugarcoat this: South Africa is behind. Patching cycles in many organisations still run into weeks. Architecture-led security – systems designed to limit blast radius and enforce least privilege so that inevitable flaws do less damage – remains concentrated in the top tier of the banks and other financial services players.

    The public sector is dangerously far behind: the recent run of government compromises did not require a frontier AI model to pull off. Mid-market enterprises and state-owned entities have neither the tools nor the architectural maturity to absorb a continuous-discovery threat model.

    hacker

    Popia enforcement is tightening, but the regulatory framework assumes a breach-response posture that predates AI-accelerated discovery. The Information Regulator was already stretched before any of this.

    The department of communications & digital technologies’ draft AI policy framework, published last week, focuses on ethics and bias, and less on cyber resilience. Meanwhile, the Cybersecurity Hub at the department has never operated at serious scale.

    If Mythos is even half as capable as Anthropic suggests, and if the broader trend continues at half its current pace, attacker-side economics will shift enough in the coming months that we should all be deeply concerned.

    Mythos, marketing caveats and all, is a reminder that the nearer-term enterprise impact will be in cybersecurity

    The defensive questions – namely, do you have continuous monitoring, time-bound privileged access and patching discipline at automated pace – apply regardless of whether the specific model doing the attacking is called Mythos or something released by a competitor six months from now.

    The instinct with frontier AI has been to focus on areas such as job displacement, economic disruption and model bias. Mythos, marketing caveats and all, is a reminder that the nearer-term enterprise impact will be in cybersecurity – whether patching cycles, identity governance and security architectures can cope with an adversary that has the equivalent of a tireless senior offensive researcher available on demand.

    Read: South Africa ‘isn’t ready’ for AI-accelerated cyberattacks

    This is not a 2028 problem; it’s here now, in 2026. And South African organisations that still treat security as a periodic audit function are simply not ready for it.  — (c) 2026 NewsCentral Media

    • The author, Duncan McLeod, is editor of TechCentral

    Get breaking news from TechCentral on WhatsApp. Sign up here.

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Anthropic Armand Kruger Claude Claude Mythos Mythos NEC XON Project Glasswing
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSouth Africa ‘isn’t ready’ for AI-accelerated cyberattacks
    Next Article New Wits-built app to warn South Africans of pollution spikes

    Related Posts

    South Africa 'isn't ready' for AI-accelerated cyberattacks - Zaheer Ebrahim

    South Africa ‘isn’t ready’ for AI-accelerated cyberattacks

    20 April 2026
    Adobe bets on AI agents to fend off cheaper rivals

    Adobe bets on AI agents to fend off cheaper rivals

    16 April 2026
    Anthropic tightens the screws on OpenAI

    Anthropic tightens the screws on OpenAI

    14 April 2026
    Company News
    Fibre: the backbone of South Africa's digital health ecosystem - Mweb

    Fibre: the backbone of South Africa’s digital health ecosystem

    16 April 2026
    New man to accelerate wholesale connectivity in the DRC - Gaetan Soltesz, FAST Congo

    New man to accelerate wholesale connectivity in the DRC

    15 April 2026
    Avast Business and Avert IT Distribution rewrite the SMB cybersecurity playbook

    Avast Business and Avert IT Distribution rewrite the SMB cybersecurity playbook

    15 April 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    New Wits-built app to warn South Africans of pollution spikes - Bruce Mellado

    New Wits-built app to warn South Africans of pollution spikes

    20 April 2026
    Hype or not, Mythos is a wake-up call for South African CISOs

    Hype or not, Mythos is a wake-up call for South African CISOs

    20 April 2026
    South Africa 'isn't ready' for AI-accelerated cyberattacks - Zaheer Ebrahim

    South Africa ‘isn’t ready’ for AI-accelerated cyberattacks

    20 April 2026
    Specialists leave mobile operators behind on home internet - Vox

    Specialists leave mobile operators behind on home internet

    20 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}