[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"tag-cybersecurity":3},{"tag":4,"articles":10},{"id":5,"name":6,"slug":6,"article_count":7,"description_zh":8,"description_en":9},"7e5f73bb-ad5e-4e87-aa6d-d876a05158af","cybersecurity",13,"資安涵蓋漏洞發現、攻擊防禦、零信任架構、雲端與供應鏈風險，也越來越常和 AI 工具交會。這個主題整理模型輔助滲透測試、政府與企業採用、以及新型威脅帶來的治理與部署問題。","Cybersecurity covers vulnerability discovery, defense, zero trust, cloud and supply-chain risk, and the growing overlap with AI tools. This tag tracks model-assisted pentesting, government and enterprise adoption, and the governance issues raised by faster offensive capabilities.",[11,20,27,35,43,50,57,64,71,78,85,92,99,106,113,120],{"id":12,"slug":13,"title":14,"summary":15,"category":16,"image_url":17,"cover_image":17,"language":18,"created_at":19},"41da0556-1d18-4e38-86fe-8f0541a60ce4","openai-cyber-model-anthropic-mythos-en","Why OpenAI’s cyber model will matter more than Anthropic’s Mythos","OpenAI’s GPT-5.5-Cyber is a gated, practical security tool, and that makes it the right move.","industry","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778508651059-rage.png","en","2026-05-11T14:10:23.731096+00:00",{"id":21,"slug":22,"title":23,"summary":24,"category":16,"image_url":25,"cover_image":25,"language":18,"created_at":26},"1328f17f-9fb9-486f-9b8e-7f8ffcc90d16","why-anthropic-is-right-on-ai-cyber-risk-en","Why Anthropic is right to sound the alarm on AI cyber risk","Anthropic is right: Mythos shows AI has turned software flaws into an urgent cyber race.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778062250514-ou47.png","2026-05-06T10:10:29.895928+00:00",{"id":28,"slug":29,"title":30,"summary":31,"category":32,"image_url":33,"cover_image":33,"language":18,"created_at":34},"3f227e2a-caf6-4c97-9914-a0b2674907e6","cloudflare-ai-code-review-prompt-injection-en","Cloudflare finds AI code review can be fooled","Cloudflare found AI code reviewers can be tricked by hidden comments, with detection dropping to 53.3% and 12% in large files.","research","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1777873866839-z09u.png","2026-05-04T05:50:35.323881+00:00",{"id":36,"slug":37,"title":38,"summary":39,"category":40,"image_url":41,"cover_image":41,"language":18,"created_at":42},"01f02be8-ac43-4c65-ad62-50822511b3c3","anthropic-mythos-model-security-panic-en","Anthropic’s Mythos Model Triggers Security Panic","Anthropic’s Mythos reportedly finds software flaws fast enough to worry governments, banks, and grid operators worldwide.","model-release","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776989029426-eyr2.png","2026-04-24T00:03:34.898207+00:00",{"id":44,"slug":45,"title":46,"summary":47,"category":16,"image_url":48,"cover_image":48,"language":18,"created_at":49},"7a3c1749-eff7-41fc-ab26-41b9c664aac9","openai-cyber-tool-five-eyes-briefings-en","OpenAI’s new cyber tool reaches Five Eyes","OpenAI has been briefing U.S. agencies and Five Eyes allies on a new cyber product as demand for AI security tools accelerates.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776946014856-fytc.png","2026-04-23T12:06:38.863311+00:00",{"id":51,"slug":52,"title":53,"summary":54,"category":32,"image_url":55,"cover_image":55,"language":18,"created_at":56},"fd36cdcc-d9b7-4d57-b64d-f89c8ad531a5","mythos-anthropic-unreleased-ai-model-explained-en","Mythos, Anthropic’s unreleased AI model, explained","Anthropic says Mythos is too dangerous to ship. Here’s what its 73% hacking score, 31-point math gain, and limited rollout mean.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776738631321-l0a3.png","2026-04-21T00:03:43.12614+00:00",{"id":58,"slug":59,"title":60,"summary":61,"category":16,"image_url":62,"cover_image":62,"language":18,"created_at":63},"0ae1e6f8-9bfd-4dbe-b60f-6a3216a8a1fa","white-house-anthropic-mythos-risks-meeting-en","White House Meets Anthropic Over Mythos Risks","The White House met Anthropic after its Mythos preview raised cyber risk concerns and the company’s fight with the Pentagon escalated.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776557029801-9f8l.png","2026-04-19T00:03:35.18939+00:00",{"id":65,"slug":66,"title":67,"summary":68,"category":40,"image_url":69,"cover_image":69,"language":18,"created_at":70},"c1fac97f-de34-4254-b62e-eddcab4b6ef3","openai-limits-gpt-54-cyber-trusted-firms-en","OpenAI Limits GPT-5.4-Cyber to Trusted Firms","OpenAI is limiting GPT-5.4-Cyber to vetted partners as it pushes AI deeper into security testing and dual-use risk management.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776297833412-wlma.png","2026-04-16T00:03:29.403078+00:00",{"id":72,"slug":73,"title":74,"summary":75,"category":16,"image_url":76,"cover_image":76,"language":18,"created_at":77},"53f9a163-d49a-4e33-8b55-ff4465c15df6","anthropic-mythos-preview-project-glasswing-cybersecurity-en","Anthropic’s Mythos Preview Raises the Cyber Stakes","Anthropic’s new Mythos Preview is being tested with Apple, Google, Microsoft, and 45+ firms to probe AI’s cyber risks.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776168419239-iouw.png","2026-04-14T12:06:36.561238+00:00",{"id":79,"slug":80,"title":81,"summary":82,"category":16,"image_url":83,"cover_image":83,"language":18,"created_at":84},"7948af32-d400-491a-8803-1359ee3dcc1a","anthropic-mythos-pr-battle-ai-risk-en","Anthropic’s Mythos and the PR battle over AI risk","Anthropic says Mythos is too risky to release. Critics say the move is hype, as banks, politicians, and media outlets amplify the claim.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776125579774-wn9f.png","2026-04-14T00:12:44.866406+00:00",{"id":86,"slug":87,"title":88,"summary":89,"category":16,"image_url":90,"cover_image":90,"language":18,"created_at":91},"ee8031b0-105a-43a8-a848-ec39a1f79e20","powell-bessent-anthropic-mythos-cybersecurity-risks-en","Powell and Bessent Flag Anthropic’s Mythos Risks","Powell, Bessent, and bank CEOs met on Anthropic’s Mythos as the company limited release and launched Project Glasswing for defense.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1775909028711-isxq.png","2026-04-11T12:03:30.899622+00:00",{"id":93,"slug":94,"title":95,"summary":96,"category":16,"image_url":97,"cover_image":97,"language":18,"created_at":98},"1f15e5b8-89ad-4c9a-ad08-3d14bf04899a","cloudflare-mastercard-cyber-defense-partnership-en","Cloudflare and Mastercard team up on cyber defense","Cloudflare and Mastercard are joining forces to map attack surfaces, grade risk, and automate defenses for businesses, governments, and critical infrastructure.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1775193347906-igy2.png","2026-04-03T05:15:29.869305+00:00",{"id":100,"slug":101,"title":102,"summary":103,"category":40,"image_url":104,"cover_image":104,"language":18,"created_at":105},"c18639f1-860d-4a85-9aaa-f675ec422079","claude-mythos-raises-bar-ai-coding-en","Claude Mythos Raises the Bar for AI Coding","Anthropic’s Claude Mythos pushes ahead in coding, reasoning, and security, while its cost and dual-use risks keep adoption selective.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1775189212799-b1l6.png","2026-04-03T04:06:36.23913+00:00",{"id":107,"slug":108,"title":109,"summary":110,"category":40,"image_url":111,"cover_image":111,"language":18,"created_at":112},"8958b20f-16e9-4838-b10e-d75865a3a3e5","claude-mythos-vs-opus-46-capability-jump-en","Claude Mythos vs Opus 4.6: How Big Is the Jump?","Leaked benchmarks suggest Claude Mythos could beat Opus 4.6 by a wide margin in coding, reasoning, and security tasks.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1775125823282-ov6z.png","2026-04-02T09:09:38.844497+00:00",{"id":114,"slug":115,"title":116,"summary":117,"category":16,"image_url":118,"cover_image":118,"language":18,"created_at":119},"59723d5d-132e-4bea-b50e-194af3a08edc","openclaw-ai-agent-boom-explained-en","OpenClaw and the AI agent boom, explained","OpenClaw turned local AI agents into a fast-moving trend, but its access to files, email, and chats brings real security tradeoffs.","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1775046572728-pghv.png","2026-04-01T09:05:55.756528+00:00",{"id":121,"slug":122,"title":123,"summary":124,"category":125,"image_url":126,"cover_image":126,"language":18,"created_at":127},"045d1abc-190d-4594-8c95-91e2a26f0c5a","googles-2026-ai-agent-report-decoded-en","Google’s 2026 AI Agent Report, Decoded","Google’s AI Agent Trends 2026 report surveyed 3,466 leaders. Here’s what the numbers say about ROI, workflows, security, and hiring.","ai-agent","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1774578557518-ok2b.png","2026-03-26T11:15:23.046616+00:00"]