[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fgomJ1OKACUq_TMlRrc2eE-WSNoMTdFmTlZFCcMBo0EU":3},{"article":4,"iocs":46},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":31,"category":32,"article_tags":35},"11693fbc-af4a-45ff-951d-6911116ee995","macOS Kernel Memory Corruption Exploit - Schneier on Security","macos-kernel-memory-corruption-exploit-schneier-on-security-b53cb4","A group used Anthropic&#8217;s Mythos AI model to help find a kernel memory corruption vulnerability and exploit on Apple&#8217;s M5. News article.","A research group leveraged Anthropic's Mythos AI model to identify and develop an exploit for a kernel memory corruption vulnerability affecting Apple's M5 chip architecture. The incident highlights the dual-use nature of AI-assisted security research, where advanced language models can accelerate both defensive and offensive vulnerability discovery. This marks a notable shift in how emerging AI capabilities are being applied to low-level system exploitation.","Researchers used Anthropic's Mythos AI to discover and exploit macOS kernel memory corruption flaw on Apple M5.","macOS Kernel Memory Corruption Exploit A group used Anthropic’s Mythos AI model to help find a kernel memory corruption vulnerability and exploit on Apple’s M5. News article. Tags: AI, Apple, exploits, vulnerabilities Posted on May 21, 2026 at 12:03 PM • 2 Comments","https:\u002F\u002Fwww.schneier.com\u002Fblog\u002Farchives\u002F2026\u002F05\u002Fmacos-kernel-memory-corruption-exploit.html",null,"2026-05-21T16:03:37+00:00","2026-05-21T17:00:07.582+00:00",7,[18,21,23,26,28],{"name":19,"type":20},"Apple","vendor",{"name":22,"type":20},"Anthropic",{"name":24,"type":25},"Mythos AI","product",{"name":27,"type":25},"Apple M5",{"name":29,"type":30},"macOS kernel","technology","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":31,"icon":13,"name":33,"slug":34},"Vulnerabilities","vulnerabilities",[36,41],{"category":37},{"id":38,"icon":13,"name":39,"slug":40},"574f766a-fb3f-487c-8d2c-0720ae75471b","Zero-day","zero-day",{"category":42},{"id":43,"icon":13,"name":44,"slug":45},"839da5c1-3c34-47e2-9499-f7201640e3ac","AI Security","ai-security",[]]