<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Artificial-Intelligence on Blog - Comfidentia</title><link>https://blog.comfidentia.cl/en/categories/artificial-intelligence/</link><description>Recent content in Artificial-Intelligence on Blog - Comfidentia</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 22 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.comfidentia.cl/en/categories/artificial-intelligence/index.xml" rel="self" type="application/rss+xml"/><item><title>Anthropic's Claude Mythos AI has been leaked, sparking concern over its potential to find vulnerabilities</title><link>https://blog.comfidentia.cl/en/2026/04/22/la-ia-claude-mythos-de-anthropic-ha-sido-filtrada-desatando-preocupacion/</link><pubDate>Wed, 22 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.comfidentia.cl/en/2026/04/22/la-ia-claude-mythos-de-anthropic-ha-sido-filtrada-desatando-preocupacion/</guid><description>&lt;p&gt;&lt;img alt="Anthropic&amp;rsquo;s Claude Mythos AI" loading="lazy" src="https://imgs.hipertextual.com/wp-content/uploads/2026/04/claude-mythos-1.jpg"&gt;&lt;/p&gt;
&lt;p&gt;Anthropic, the artificial intelligence company, has confirmed that its new cybersecurity expert language model, Claude Mythos, has been compromised. Despite having restricted access to the tool due to its potential danger, AI has fallen into unauthorized hands, generating serious concern in the technology industry.&lt;/p&gt;
&lt;h3 id="claude-mythos-a-cybersecurity-ai-with-limited-access"&gt;Claude Mythos: A Cybersecurity AI with Limited Access&lt;/h3&gt;
&lt;p&gt;Claude Mythos was developed with the intention of being an ally in cybersecurity, capable of finding vulnerabilities in operating systems and browsers. However, due to its power, Anthropic drastically limited its availability, allowing very restricted access only to select companies such as Apple, Amazon, and Microsoft. The company rejected thousands of requests from other companies, aware that this tool could be used for malicious purposes.&lt;/p&gt;</description></item></channel></rss>