New OpenAI cyber product, unauthorized Mythos access, insurers to cap LLMjacking payouts
7 min
•Apr 23, 20265 days agoSummary
This episode covers OpenAI's new GPT 5.4 cyber model rollout to government agencies, unauthorized access to Anthropic's Mythos vulnerability-finding model, and insurers capping payouts for AI-related cyber incidents like LLM jacking. Additional stories include a dismantled manga piracy platform, NCSC's SilentGlass HDMI security device, North Korean supply chain attacks using fake job offers, and a new Kyber ransomware variant experimenting with post-quantum encryption.
Insights
- AI security models designed to find vulnerabilities are becoming high-value targets for unauthorized access, creating a paradox where security tools themselves become security risks
- Insurance industry is preemptively restricting coverage for emerging AI threats before the threat landscape fully materializes, potentially leaving enterprises underprotected
- Post-quantum cryptography adoption by threat actors appears premature and doesn't materially improve attack outcomes, suggesting it's being used for marketing or future-proofing rather than tactical advantage
- Supply chain attacks are evolving to weaponize legitimate development tools and workflows, making traditional code review and repository security insufficient
- Physical security vectors like monitor connections remain exploitable and underprotected despite being well-understood attack surfaces
Trends
AI model access control becoming critical security concern as capabilities expandInsurance industry moving to narrow AI-related cyber coverage through sublimits and exclusionsPost-quantum cryptography experimentation by threat actors ahead of quantum threat materializationSupply chain attacks leveraging fake recruitment and developer social engineeringPhysical security devices gaining commercial availability after government deploymentVulnerability-finding AI models being restricted to limited organizations due to dual-use concernsNorth Korean threat actors expanding into open source ecosystem targetingRansomware operators coordinating multi-platform attacks across Windows and VMware ESXi
Topics
AI Cyber Security Models and GovernanceUnauthorized Access to Restricted AI SystemsLLM Jacking and AI-Related Cyber InsuranceSupply Chain Security in Open SourcePost-Quantum Cryptography AdoptionPhysical Security and Monitor ExploitationNorth Korean Threat Actor OperationsRansomware and Data Backup DestructionDocker Image and Container Supply Chain CompromiseZero Trust Network AccessVulnerability Discovery AutomationCredential Compromise and ExposurePiracy Platform Takedown OperationsHDMI and DisplayPort SecurityVS Code Extension Security
Companies
OpenAI
Briefing 50+ U.S. federal and Five Eyes agencies on new GPT 5.4 cyber model through controlled tiered access program
Anthropic
Mythos vulnerability-finding model experienced unauthorized access by third-party contractor group via URL guessing
Mozilla
Used Mythos model to identify 271 bugs in Firefox 150, demonstrating faster vulnerability discovery than manual methods
QBE Insurance
Moving to cap payouts for AI-related cyber incidents including LLM jacking through sublimits on coverage
Beasley
Implementing sublimits on AI-related cyber incident coverage alongside other major insurers
National Cyber Security Centre
Unveiled SilentGlass plug-in device at Cyber UK to secure HDMI and DisplayPort connections against malicious signals
Goldilocks Labs
Co-developed SilentGlass device with NCSC and Sony UK for securing monitor connections
Sony UK
Co-developed SilentGlass device with NCSC and Goldilocks Labs for commercial deployment
Trend Micro
Researched North Korean VoidDokavi group's self-propagating supply chain attacks using fake job offers
Rapid7
Analyzed new Kyber ransomware operation targeting Windows and VMware ESXi with post-quantum cryptography experimentation
Socket
Identified compromised Checkmarx KICS Docker images and VS Code extensions enabling data exfiltration
Checkmarx
Supply chain compromised with malicious code injected into KICS Docker images and VS Code extensions
People
Sarah Lane
Hosted and reported the cybersecurity headlines episode
Quotes
"The model is being offered through a tiered trusted access program with vetting similar to commercial users, alongside a more restricted version with stronger safeguards"
Sarah Lane•~1:30
"All of the bugs could have also been found by a human Mythos simply found them faster"
Sarah Lane•~4:00
"Researchers note the use of post-quantum methods doesn't materially change outcomes for victims"
Sarah Lane•~13:30
"The incident likely spans multiple distribution channels, advising organizations to treat any credentials exposed through impacted scans as compromised"
Sarah Lane•~15:45
Full Transcript