Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Setback for Microsoft's Africa cloud ambitions

      Setback for Microsoft’s Africa cloud ambitions

      10 May 2026
      Reinvest spectrum cash in ICT sector, industry urges

      Reinvest spectrum cash in ICT sector, industry urges

      10 May 2026
      South Africa cuts red tape for dealmakers

      South Africa cuts red tape for dealmakers

      10 May 2026
      Hyperscalers ate my next computer

      Hyperscalers ate my next computer

      8 May 2026
      Major African telco postpones mobile money listing

      Major African telco postpones mobile money listing

      8 May 2026
    • World
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Worries over OpenAI's growth as Anthropic gains ground - Sam Altman. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
      Taylor Swift trademarks her voice to fight AI fakes

      Taylor Swift trademarks her voice to fight AI fakes

      28 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Hype or not, Mythos is a wake-up call for South African CISOs

    Hype or not, Mythos is a wake-up call for South African CISOs

    Whether Anthropic's new Mythos model lives up to the hype or not, South Africa is not prepared for what's coming.
    By Duncan McLeod20 April 2026
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Hype or not, Mythos is a wake-up call for South African CISOs

    Should South African organisations be panicked about Claude Mythos? The answer depends partly on whether the model lives up to its own marketing hype and partly on a set of defensive questions that are going to matter regardless.

    A brief recap: Mythos is the most capable AI model that San Francisco-based Anthropic has built, sitting above the Opus tier, its current flagship. The new model’s existence was revealed in late March when a configuration error in Anthropic’s content management system exposed roughly 3 000 unpublished assets, including a draft blog post describing a model Anthropic said posed “unprecedented cybersecurity risks”.

    The company confirmed the leak, officially announced Claude Mythos Preview on 7 April, and said it would not be releasing the model publicly. Access is being granted via a restricted programme called Project Glasswing to a small group of early-access customers, with a version now being rolled out to US federal agencies.

    Anthropic’s own documents show Mythos developing and using a full Linux kernel exploit

    Anthropic’s own documents show Mythos developing and using a full Linux kernel exploit – the kind of offensive work that used to require senior security talent operating over weeks.

    This is an unusual sequence of events. It is also one that has done more for Anthropic’s enterprise positioning than any advertising campaign could have. TechCentral readers are entitled to some scepticism here: the shape of the story – a capability so dangerous it must be restricted, but not so dangerous that it cannot be sold to useful customers – sounds suspiciously like a marketing stunt. A system misconfiguration that happens to expose exactly the sort of draft blog a marketing team would have published anyway? Read into that what you will.

    Direction of travel

    But that scepticism does not make the underlying trend any less real. Even discounting Anthropic’s own framing, the direction of travel in frontier AI is unambiguous. Whether or not this specific model lives up to the hype, the broader shift is that vulnerability discovery is becoming cheap. And the economics of attack are changing faster than the economics of defence. That’s the real problem – not Mythos, and not any single model.

    Armand Kruger, head of cybersecurity at NEC XON, noted in recent comments to TechCentral that the challenge for chief information security officers (CISOs) is no longer finding vulnerabilities but prioritising and remediating them fast enough. The time to vulnerability discovery is being compressed with each advancing AI model.

    Read: Anthropic’s Mythos is the cyberthreat every CISO feared

    And let’s not sugarcoat this: South Africa is behind. Patching cycles in many organisations still run into weeks. Architecture-led security – systems designed to limit blast radius and enforce least privilege so that inevitable flaws do less damage – remains concentrated in the top tier of the banks and other financial services players.

    The public sector is dangerously far behind: the recent run of government compromises did not require a frontier AI model to pull off. Mid-market enterprises and state-owned entities have neither the tools nor the architectural maturity to absorb a continuous-discovery threat model.

    hacker

    Popia enforcement is tightening, but the regulatory framework assumes a breach-response posture that predates AI-accelerated discovery. The Information Regulator was already stretched before any of this.

    The department of communications & digital technologies’ draft AI policy framework, published last week, focuses on ethics and bias, and less on cyber resilience. Meanwhile, the Cybersecurity Hub at the department has never operated at serious scale.

    If Mythos is even half as capable as Anthropic suggests, and if the broader trend continues at half its current pace, attacker-side economics will shift enough in the coming months that we should all be deeply concerned.

    Mythos, marketing caveats and all, is a reminder that the nearer-term enterprise impact will be in cybersecurity

    The defensive questions – namely, do you have continuous monitoring, time-bound privileged access and patching discipline at automated pace – apply regardless of whether the specific model doing the attacking is called Mythos or something released by a competitor six months from now.

    The instinct with frontier AI has been to focus on areas such as job displacement, economic disruption and model bias. Mythos, marketing caveats and all, is a reminder that the nearer-term enterprise impact will be in cybersecurity – whether patching cycles, identity governance and security architectures can cope with an adversary that has the equivalent of a tireless senior offensive researcher available on demand.

    Read: South Africa ‘isn’t ready’ for AI-accelerated cyberattacks

    This is not a 2028 problem; it’s here now, in 2026. And South African organisations that still treat security as a periodic audit function are simply not ready for it.  — (c) 2026 NewsCentral Media

    • The author, Duncan McLeod, is editor of TechCentral

    Get breaking news from TechCentral on WhatsApp. Sign up here.

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Anthropic Armand Kruger Claude Claude Mythos Mythos NEC XON Project Glasswing
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleNTT Data claims Africa-first 400Gbit/s peering at Jinx
    Next Article John Ternus and the battle for Apple’s soul

    Related Posts

    More details about Apple's AI plans emerge

    More details about Apple’s AI plans emerge

    6 May 2026
    Why Africa is uniquely placed to leapfrog the world on cybersecurity - Armand Kruger NEC XON

    Why Africa is uniquely placed to leapfrog the world on cybersecurity

    6 May 2026
    Worries over OpenAI's growth as Anthropic gains ground - Sam Altman. Shelby Tauber/Reuters

    Worries over OpenAI’s growth as Anthropic gains ground

    28 April 2026
    Company News
    Your databases are being watched - just not by you - Ascent Technology Johan Lambert

    Your databases are being watched – just not by you

    8 May 2026
    Hexion deploys 30 petabyte sovereign data archive in South Africa

    Hexion deploys 30 petabyte sovereign data archive in South Africa

    7 May 2026
    We're hiring: TechCentral is looking for technology journalists

    We’re hiring: TechCentral is looking for technology journalists

    6 May 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Setback for Microsoft's Africa cloud ambitions

    Setback for Microsoft’s Africa cloud ambitions

    10 May 2026
    Reinvest spectrum cash in ICT sector, industry urges

    Reinvest spectrum cash in ICT sector, industry urges

    10 May 2026
    South Africa cuts red tape for dealmakers

    South Africa cuts red tape for dealmakers

    10 May 2026
    Hyperscalers ate my next computer

    Hyperscalers ate my next computer

    8 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}