{"id":67066,"date":"2026-04-22T01:51:39","date_gmt":"2026-04-21T23:51:39","guid":{"rendered":"https:\/\/www.apfelpatient.de\/?p=67066"},"modified":"2026-04-22T01:53:17","modified_gmt":"2026-04-21T23:53:17","slug":"anthropic-myth-unauthorized-access-has-been-gained","status":"publish","type":"post","link":"https:\/\/www.apfelpatient.de\/en\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt","title":{"rendered":"Unauthorized access to Anthropic&#039;s myth \u2013 a security risk for Apple?"},"content":{"rendered":"<p class=\"has-drop-cap\"><strong>According to a report, an unauthorized group has gained access to Anthropic&#039;s exclusive Mythos cybersecurity model \u2013 via a third-party provider working for Anthropic. This is significant because the model was deliberately distributed only to select partners like Apple to prevent misuse.<\/strong><\/p>\n\n\n\n<p class=\"translation-block\">Mythos is Anthropic's most powerful cybersecurity model and was released in <a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-and-anthropic-launch-cybersecurity-project\" id=\"https:\/\/www.apfelpatient.de\/news\/apple-und-anthropic-starten-cybersecurity-projekt\" data-wpel-link=\"internal\" target=\"_self\">April 2026<\/a> to a select group of partners as part of Project Glasswing \u2013 including major players like Apple, Google, Microsoft, and the US National <a href=\"\/\/www.apfelpatient.de\/en\/news\/nsa-uses-anthropic-myth-despite-pentagon-dispute\" id=\"https:\/\/www.apfelpatient.de\/news\/nsa-nutzt-anthropic-mythos-trotz-pentagon-streit\" data-wpel-link=\"internal\" target=\"_self\">Security Agency (NSA)<\/a>. The idea behind this restriction: The model is so powerful that it could become a dangerous attack tool in the wrong hands. Now, <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-04-21\/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users\" id=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-04-21\/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users\" target=\"_blank\" rel=\"noreferrer noopener\" data-wpel-link=\"external\">Bloomberg<\/a> reports that this very safeguard may have failed.<\/p>\n\n\n\n<p>According to reports, an unknown online group gained access to Mythos on the day of its public announcement and has been using it regularly ever since. Access was gained through a third-party provider working on behalf of Anthropic. Anthropic has confirmed the incident but is still investigating, clarifying that its own systems appear not to be directly affected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-so-kam-die-gruppe-an-mythos\">That&#039;s how the group came to Mythos<\/h2>\n\n\n\n<p>According to Bloomberg, the unauthorized group consists of members of a private Discord channel who are specifically working with unpublished AI models. The group describes itself as curious \u2013 their interest lies in experimenting with new models, not causing harm.<\/p>\n\n\n\n<p>Access was gained via the user credentials of an individual currently employed by one of Anthropic&#039;s third-party providers. The group used these credentials to log in to Mythos. Additionally, they apparently determined the model&#039;s location within the Anthropic infrastructure through &quot;informed guesswork&quot;\u2014based on the format Anthropic had used for previous models.<\/p>\n\n\n\n<p>As proof, the group provided Bloomberg with screenshots and a live demonstration of the tool. This suggests that the access actually exists \u2013 not a mere bluff or hoax.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-anthropics-reaktion\">Anthropic&#039;s reaction<\/h2>\n\n\n\n<p class=\"translation-block\">An Anthropic spokesperson told <a href=\"https:\/\/techcrunch.com\/2026\/04\/21\/unauthorized-group-has-gained-access-to-anthropics-exclusive-cyber-tool-mythos-report-claims\/\" id=\"https:\/\/techcrunch.com\/2026\/04\/21\/unauthorized-group-has-gained-access-to-anthropics-exclusive-cyber-tool-mythos-report-claims\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-wpel-link=\"external\">TechCrunch<\/a>: The company is investigating the report of unauthorized access to Mythos Preview via a third-party environment. So far, they have found no evidence that the allegedly unauthorized activity affected Anthropic's own systems.<\/p>\n\n\n\n<p>The wording is cautious. This suggests two things: First, Anthropic is taking the incident seriously enough to respond publicly. Second, the company is trying to limit the damage \u2013 the message is: Our systems are secure, it&#039;s a third-party issue.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-warum-das-fur-apple-relevant-ist\">Why this is relevant for Apple<\/h2>\n\n\n\n<p class=\"translation-block\">For Apple, the incident is not directly damaging \u2013 the company is an authorized partner and legitimately uses Mythos. Apple&#039;s role in <a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-and-anthropic-launch-cybersecurity-project\" id=\"https:\/\/www.apfelpatient.de\/news\/apple-und-anthropic-starten-cybersecurity-projekt\" data-wpel-link=\"internal\" target=\"_self\">Project Glasswing<\/a> is to use the model to improve its own cybersecurity \u2013 for example, to analyze iOS and macOS vulnerabilities before they are discovered by attackers.<\/p>\n\n\n\n<p>However, problems arise when unauthorized individuals use the model against Apple products. Mythos was specifically designed to efficiently find security vulnerabilities. If these same capabilities fall into the hands of people who are not legitimate security researchers, iOS, macOS, and other systems could be attacked faster than Apple can react.<\/p>\n\n\n\n<p>However, the group describes itself as curious testers, not attackers. That sounds reassuring, but it&#039;s no guarantee. Those who use Mythos today only for experimentation could resell it to criminals tomorrow \u2013 and this very risk of escalation is why Anthropic wanted to control access so strictly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-das-kernproblem-drittanbieter-sind-immer-das-schwachste-glied\">The core problem: Third-party providers are always the weakest link<\/h2>\n\n\n\n<p>This incident highlights a long-standing IT security problem: sharing sensitive systems with numerous external partners inevitably creates additional attack vectors. Even if Apple, Google, and Microsoft perfectly secure their own Mythos access points, the risk remains with each individual third-party provider.<\/p>\n\n\n\n<p>Anthropic thus faces the typical challenge of AI companies with enterprise-oriented products: How to balance access (so that customers can use the tool) and security (so that it is not misused)? The answer so far has been a limited circle of authorized partners \u2013 which, as expected, does not work perfectly as soon as these partners share their access or fail to adequately protect it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-was-als-nachstes-kommt\">What comes next?<\/h2>\n\n\n\n<p>Anthropic will likely respond to the incident with enhanced security measures \u2013 such as stricter authentication, IP whitelisting, or even tighter access logging. For Apple, this means that access to Mythos could become more cumbersome in the future, but also more secure.<\/p>\n\n\n\n<p>At the same time, this case is likely to spark a broader discussion about the security of AI models. If even Anthropic, with its strict partner program, cannot prevent unauthorized access, the question arises as to how access to powerful AI tools can be controlled in the future. This is a debate that affects not only Anthropic, but the entire industry \u2013 from OpenAI to Google to Apple itself. (Image: Shutterstock \/ gguy)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-managed-to-keep-the-ceo-change-perfectly-secret\" type=\"link\" id=\"https:\/\/www.apfelpatient.de\/news\/apple-konnte-den-ceo-wechsel-perfekt-geheim-halten\">What Apple's CEO change reveals about the Company<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/whatsapp-ai-summary-for-all-chats\">WhatsApp is testing AI summaries for unread chats<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ternus-sees-new-breakthroughs-on-the-horizon-for-apple\">Ternus: \"Apple will change the world again\"<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/cook-explains-why-he-is-now-stepping-down-as-ceo\">Tim Cook explains why he is stepping down as CEO now<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ios-27-plans-stricter-network-security\">iOS 27 and macOS 27 bring stricter Network Security<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ternus-introduces-ai-platform-at-apple\">Ternus brings a new AI platform to the Hardware Team<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/how-wall-street-reacted-to-apples-ceo-change\">This is how Wall Street is reacting to Apple&#039;s CEO change<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/silo-season-3-starts-on-july-3rd-on-apple-tv\">Silo Season 3 premieres on July 3rd on Apple TV<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/cook-leak-was-an-apple-test-balloon-for-ternus\">The Cook resignation &quot;leak&quot; was a planned Apple test balloon.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ternus-is-a-decisive-ceo-for-apple\">Ternus: A decisive CEO for Apple<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/doj-criticizes-apples-samsung-application-in-the-proceedings\">US Department of Justice criticizes Apple&#039;s Samsung application in the antitrust case<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/srouji-divides-apples-hardware-team-into-5-areas\">Srouji divides Apple&#039;s hardware team into five areas<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/brazil-issues-warning-to-apple-over-gambling-apps\">Brazil issues warning to Apple over gambling apps for minors<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-ceo-change-internal-memos-provide-insight\">Apple CEO change: Internal memos from Cook and Ternus provide insight<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/tim-cook-addresses-farewell-letter-to-the-apple-community\">Tim Cook addresses an emotional farewell letter to the Apple community<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/johnny-srouji-will-become-apples-chief-hardware-officer\">Johny Srouji will become Apple&#039;s Chief Hardware Officer<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/john-ternus-will-be-the-new-apple-ceo-cook-is-leaving\">Apple leadership change: John Ternus becomes new CEO, Tim Cook becomes Executive Chairman<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/whatsapp-plus-meta-is-testing-a-paid-subscription\">WhatsApp Plus: Meta is testing a paid subscription with premium features<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/apple-sports-app-f1-weather-and-smaller-widgets\">Apple Sports App: New update brings F1 weather and smaller widgets<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ios-26-4-2-is-about-to-be-released\">iOS 26.4.2 is about to be released<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/ios-26-5-beta-3-next-step-towards-release\">iOS 26.5 Beta 3: Next step towards release<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/mac-sales-grew-more-strongly-than-the-pc-market-in-q1\">Mac sales are growing faster than the PC market \u2013 Apple is profiting from the price crisis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/news\/app-store-current-ratings-are-significantly-worse\">App Store: Current ratings are significantly worse than average<\/a><\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-kennt-ihr-schon-unsere-amazon-storefront-dort-findet-ihr-eine-handverlesene-auswahl-von-diversen-produkten-f-r-euer-iphone-und-co-viel-spa-beim-st-bern\"><em>Have you already visited our Amazon Storefront? There you&#039;ll find a hand-picked selection of various products for your iPhone and other devices \u2013 <span class=\"has-inline-color has-vivid-red-color\"><a href=\"https:\/\/www.amazon.de\/shop\/apfelpatientofficial\" class=\"ek-link\" data-wpel-link=\"exclude\" rel=\"follow noopener\" target=\"_self\"><span style=\"text-decoration: underline\" class=\"ek-underline\">enjoy browsing<\/span><\/a> !<\/span><\/em><\/h6>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-der-beitrag-enthalt-partnerlinks\">This post contains <a data-type=\"URL\" data-id=\"https:\/\/www.apfelpatient.de\/partnerprogramm\" href=\"https:\/\/www.apfelpatient.de\/en\/partner-program\" data-wpel-link=\"internal\" target=\"_self\">affiliate links<\/a>.<\/h6>","protected":false},"excerpt":{"rendered":"<p>An online group gained access to Anthropic&#039;s Mythos cybersecurity model through a third-party provider. Apple is a partner.<\/p>","protected":false},"author":2,"featured_media":67065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"format":"standard","override":[{"template":"2","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","post_calculate_word_method":"str_word_count","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","show_comment_section":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post_position":"meta","trending_post_label":"Trending","sponsored_post_label":"Sponsored by","disable_ad":"0"},"jnews_primary_category":{"id":"9"},"footnotes":""},"categories":[9],"tags":[1217,1216],"class_list":["post-67066","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anthropic","tag-claude"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Anthropic Mythos: Unbefugte haben Zugriff erlangt Apfelpatient<\/title>\n<meta name=\"description\" content=\"Eine Online-Gruppe hat \u00fcber einen Drittanbieter Zugang zu Anthropics Cybersecurity-Modell Mythos erlangt. Apple ist Partner.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apfelpatient.de\/en\/news\/anthropic-myth-unauthorized-access-has-been-gained\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unbefugte haben Zugriff auf Anthropics Mythos - Sicherheitsrisiko f\u00fcr Apple?\" \/>\n<meta property=\"og:description\" content=\"Eine Online-Gruppe hat \u00fcber einen Drittanbieter Zugang zu Anthropics Cybersecurity-Modell Mythos erlangt. Apple ist Partner.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apfelpatient.de\/en\/news\/anthropic-myth-unauthorized-access-has-been-gained\" \/>\n<meta property=\"og:site_name\" content=\"Apfelpatient\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-21T23:51:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-21T23:53:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2767571915.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"921\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Milan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Eine Online-Gruppe hat \u00fcber einen Drittanbieter Zugang zu Anthropics Cybersecurity-Modell Mythos erlangt. Apple ist Partner.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt\"},\"author\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"headline\":\"Unbefugte haben Zugriff auf Anthropics Mythos &#8211; Sicherheitsrisiko f\u00fcr Apple?\",\"datePublished\":\"2026-04-21T23:51:39+00:00\",\"dateModified\":\"2026-04-21T23:53:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt\"},\"wordCount\":994,\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2767571915.jpg\",\"keywords\":[\"Anthropic\",\"Claude\"],\"articleSection\":\"News\",\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt\",\"name\":\"Anthropic Mythos: Unbefugte haben Zugriff erlangt Apfelpatient\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2767571915.jpg\",\"datePublished\":\"2026-04-21T23:51:39+00:00\",\"dateModified\":\"2026-04-21T23:53:17+00:00\",\"description\":\"Eine Online-Gruppe hat \u00fcber einen Drittanbieter Zugang zu Anthropics Cybersecurity-Modell Mythos erlangt. Apple ist Partner.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2767571915.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2767571915.jpg\",\"width\":1600,\"height\":921,\"caption\":\"Bild: Shutterstock \\\/ gguy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.apfelpatient.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unbefugte haben Zugriff auf Anthropics Mythos &#8211; Sicherheitsrisiko f\u00fcr Apple?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/\",\"name\":\"Apfelpatient\",\"description\":\"Alles rund um Apple!\",\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"alternateName\":\"Apfelpatient\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apfelpatient.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/42c7891440704b11b0b6bba927ebf52c\",\"name\":\"Milan\",\"logo\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/image\\\/\"},\"description\":\"Hallo und herzlich willkommen auf meinem Technik-Blog! Als gro\u00dfer Apple-Fan berichte ich hier \u00fcber alles, was mit Apple zu tun hat: von den neuesten News und spannenden Ger\u00fcchten \u00fcber hilfreiche Tipps und Tricks bis hin zu ausf\u00fchrlichen Produkttests. Wenn du genauso technikbegeistert bist wie ich, bist du hier genau richtig!\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apfelpatientOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/milan-jovicic-42aa0231b\"],\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/author\\\/apfeladmin\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Anthropic Mythos: Unauthorized persons have gained access Apfelpatient","description":"An online group gained access to Anthropic&#039;s Mythos cybersecurity model through a third-party provider. Apple is a partner.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apfelpatient.de\/en\/news\/anthropic-myth-unauthorized-access-has-been-gained","og_locale":"en_US","og_type":"article","og_title":"Unbefugte haben Zugriff auf Anthropics Mythos - Sicherheitsrisiko f\u00fcr Apple?","og_description":"Eine Online-Gruppe hat \u00fcber einen Drittanbieter Zugang zu Anthropics Cybersecurity-Modell Mythos erlangt. Apple ist Partner.","og_url":"https:\/\/www.apfelpatient.de\/en\/news\/anthropic-myth-unauthorized-access-has-been-gained","og_site_name":"Apfelpatient","article_publisher":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_author":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_published_time":"2026-04-21T23:51:39+00:00","article_modified_time":"2026-04-21T23:53:17+00:00","og_image":[{"width":1600,"height":921,"url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2767571915.jpg","type":"image\/jpeg"}],"author":"Milan","twitter_card":"summary_large_image","twitter_description":"Eine Online-Gruppe hat \u00fcber einen Drittanbieter Zugang zu Anthropics Cybersecurity-Modell Mythos erlangt. Apple ist Partner.","twitter_misc":{"Written by":"Milan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#article","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt"},"author":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"headline":"Unbefugte haben Zugriff auf Anthropics Mythos &#8211; Sicherheitsrisiko f\u00fcr Apple?","datePublished":"2026-04-21T23:51:39+00:00","dateModified":"2026-04-21T23:53:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt"},"wordCount":994,"publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2767571915.jpg","keywords":["Anthropic","Claude"],"articleSection":"News","inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/www.apfelpatient.de\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt","url":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt","name":"Anthropic Mythos: Unauthorized persons have gained access Apfelpatient","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2767571915.jpg","datePublished":"2026-04-21T23:51:39+00:00","dateModified":"2026-04-21T23:53:17+00:00","description":"An online group gained access to Anthropic&#039;s Mythos cybersecurity model through a third-party provider. Apple is a partner.","breadcrumb":{"@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#primaryimage","url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2767571915.jpg","contentUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2767571915.jpg","width":1600,"height":921,"caption":"Bild: Shutterstock \/ gguy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apfelpatient.de\/news\/anthropic-mythos-unbefugte-haben-zugriff-erlangt#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.apfelpatient.de\/"},{"@type":"ListItem","position":2,"name":"Unbefugte haben Zugriff auf Anthropics Mythos &#8211; Sicherheitsrisiko f\u00fcr Apple?"}]},{"@type":"WebSite","@id":"https:\/\/www.apfelpatient.de\/#website","url":"https:\/\/www.apfelpatient.de\/","name":"apple patient","description":"Everything about Apple!","publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"alternateName":"Apfelpatient","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apfelpatient.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/42c7891440704b11b0b6bba927ebf52c","name":"Milan","logo":{"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/image\/"},"description":"Hello and welcome to my technology blog! As a big Apple fan, I report on everything to do with Apple: from the latest news and exciting rumors to helpful tips and tricks and detailed product tests. If you are as enthusiastic about technology as I am, you have come to the right place!","sameAs":["https:\/\/www.facebook.com\/apfelpatientOfficial","https:\/\/www.linkedin.com\/in\/milan-jovicic-42aa0231b"],"url":"https:\/\/www.apfelpatient.de\/en\/author\/apfeladmin"}]}},"_links":{"self":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/67066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/comments?post=67066"}],"version-history":[{"count":2,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/67066\/revisions"}],"predecessor-version":[{"id":67068,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/67066\/revisions\/67068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media\/67065"}],"wp:attachment":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media?parent=67066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/categories?post=67066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/tags?post=67066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}