<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Software-Security on</title><link>https://mhicks.me/categories/software-security/</link><description>Recent content in Software-Security on</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 05 May 2026 07:54:48 -0400</lastBuildDate><atom:link href="https://mhicks.me/categories/software-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Beyond Penetrate-and-Patch</title><link>https://mhicks.me/blog/beyond-penetrate-and-patch/</link><pubDate>Tue, 05 May 2026 00:00:00 +0000</pubDate><guid>https://mhicks.me/blog/beyond-penetrate-and-patch/</guid><description>&lt;p>In April, Anthropic announced Claude Mythos Preview alongside Project Glasswing, reporting that the model had identified thousands of high-severity zero-day vulnerabilities across every major operating system and web browser, including a 27-year-old bug in OpenBSD.&lt;sup id="fnref:1">&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref">1&lt;/a>&lt;/sup> Days later, Mozilla announced patches for 271 vulnerabilities Mythos had surfaced in Firefox — a roughly twelve-fold leap over the 22 bugs Opus 4.6 had found only weeks earlier. Mozilla&amp;rsquo;s CTO declared, in a blog post titled &amp;ldquo;The zero-days are numbered,&amp;rdquo; that defenders finally had a chance to win decisively.&lt;sup id="fnref:2">&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref">2&lt;/a>&lt;/sup> Anthropic, in its own announcement, argued that once the security landscape reaches a new equilibrium, powerful language models will benefit defenders more than attackers.&lt;/p></description></item></channel></rss>