Close Menu
Daily Guardian
  • Home
  • News
  • Politics
  • Business
  • Entertainment
  • Lifestyle
  • Health
  • Sports
  • Technology
  • Climate
  • Auto
  • Travel
  • Web Stories
What's On

Vancouver mayor clarifies ’11 AI agents’ used to do work is strictly personal

May 13, 2026

Danielle Smith rejects Alberta judge’s ruling against separation petition as ‘anti-democratic’

May 13, 2026

YouTube is courting creators — and sponsors — with streaming shows

May 13, 2026

PHR DEADLINE ALERT: Faruqi & Faruqi, LLP Reminds Phreesia (PHR) Investors of Securities Class Action Deadline on July 13, 2026

May 13, 2026

Old National Introduces ‘Team Old National’ PGA TOUR and NCAA Golf Ambassadors

May 13, 2026
Facebook X (Twitter) Instagram
Finance Pro
Facebook X (Twitter) Instagram
Daily Guardian
Subscribe
  • Home
  • News
  • Politics
  • Business
  • Entertainment
  • Lifestyle
  • Health
  • Sports
  • Technology
  • Climate
  • Auto
  • Travel
  • Web Stories
Daily Guardian
Home » Multimedia Update – Sweet Security Launches Sweet Attack to Debunk The Myth Before Mythos Ships
Press Release

Multimedia Update – Sweet Security Launches Sweet Attack to Debunk The Myth Before Mythos Ships

By News RoomMay 13, 20264 Mins Read
Multimedia Update – Sweet Security Launches Sweet Attack to Debunk The Myth Before Mythos Ships
Share
Facebook Twitter LinkedIn Pinterest Email

NEW YORK, May 13, 2026 (GLOBE NEWSWIRE) — Anthropic’s release of the Mythos benchmark earlier this year crystallized an anxiety that has been building across enterprise security teams for the past eighteen months: attackers now wield AI-grade tooling that rivals — and in some cases exceeds — nation-state capability, with immediate knowledge of exploitable vulnerabilities at a pace defenders cannot match.

Mythos turned that fear into a benchmark, and boards are now asking CISOs for a number against it. Each generation of red-teaming has gotten closer — and stopped short. DAST probes applications from the outside. Human red teams bring skill, but episodically, and typically through ‘spray and pray’. AI red teams brought speed, but still guessed from outside — lacking the intimate organizational data that paves the way in.

In response, Sweet Security today launched Sweet Attack, an AI red-team agent with the data attackers wish they had. Sweet Attack operates like a navigator with live charts of terrain others can only guess at. Built on the execution-level runtime data Sweet has indexed since day one, Sweet Attack fuses context, intel, and semantic data into the layered attack paths an adversary would walk — at AI speed. It gives defenders the one capability Mythos cannot supply on its own: the power to navigate the unknown, not just name it.

“Cast & Crew has engaged tier-one offensive security firms for years. Sweet Attack surfaced exploitable attack paths in three days that prior engagements had not identified, and paired the findings with a concrete, prioritized remediation plan we were able to action immediately. The combination of depth and operational usability is what set the engagement apart.” — Tal Hornstein, Chief Information Security Officer, Cast & Crew Entertainment Services

“While we always had visibility into our vulnerabilities, we lacked the necessary context for consistent and effective prioritization. Our teams often struggled to balance endless remediations with product deadlines because validating every attack path was impossible. Sweet Attack changed this by quickly surfacing verified, exploitable paths. This shifted our focus from simply ‘remediating vulnerabilities’ to ‘preventing breaches’. In a world where AI accelerates the threat landscape, discovering and remediating these attack paths before attackers exploit them matters most.” — Birat Niraula, CISO, Auctane

Sweet Attack — How it Works

Even the most capable attackers spend 90% of their time guessing. Sweet Attack starts at a breaking advantage point where it has live, empirical, and indicative data trails. This includes: runtime topology, unencrypted Layer 7 exposure, deployed source code, identity paths, and live application behavior. 

Sweet Attack identifies openings across vulnerabilities, identity relationships, permissive scopes, exposed APIs, and unauthenticated endpoints, then probes them step-by-step to determine which combinations form exploitable attack chains. If a path can’t be exercised, it is abandoned. If it can, Sweet Attack continues until it overtakes the brick walls. Every chain is logged with reproducible evidence — including the runtime conditions that made it work. Because the agent operates in real production conditions, it only goes where there is a path worth walking.

Key capabilities

  • Continuous enumeration and execution of attack chains, in a controlled manner
  • L7-native: every API call, identity, prompt, and response indexed and replayable
  • Real production conditions — no synthetic environments, no assumptions
  • Audit-ready reporting on validated chains, exploitation steps, and remediation paths

“For two years the industry has been bracing for an attacker class moving at AI speed — with nation-state tooling and live knowledge of every exploitable seam. Mythos forced everyone to put a number on the gap. We can. Sweet Attack doesn’t model the threat — it safely executes it against the customer’s actual production environment and reports back what worked. The myth is that defenders can’t keep up with attack speed. Sweet Attack debunks it.” — Dror Kashti, CEO and co-founder, Sweet Security

Availability

Sweet Attack is generally available today to all Sweet customers. CISOs can put Mythos to the test in their environment — at full potential, harm-free, before the benchmark ships — at hi.sweet.security/attack.

The first red-team agent that brings together Mythos grade models and a novel whitebox adversarial approach

About Sweet Security

Sweet Security is a leading security platform for dynamic cloud and AI environments. It enables organizations to see what matters, understand why it matters, and act on it instantly. By turning real-time behavior into clear decisions and controlled action, Sweet helps security teams move beyond detection to stop threats before they’re exploited. Built for the speed and complexity of modern cloud and AI systems, Sweet brings clarity, confidence, and control to environments that never stand still.

Sweet Security was founded by Dror Kashti, CEO, Eyal Fisher, CPO, and Orel Ben Ishay, VP R&D. Privately funded, Sweet is backed by Evolution Equity Partners, Munich Re Ventures, Glilot Capital Partners, CyberArk Ventures, and an elite group of angel investors. For more information, visit sweet.security.

Media Contact

Noa Glumcher, CMO Sweet Security [email protected]

Photos accompanying this announcement are available at:
https://www.globenewswire.com/NewsRoom/AttachmentNg/2d92d38e-a96b-473d-9a61-d65ffff24883
https://www.globenewswire.com/NewsRoom/AttachmentNg/e9455eb1-5d0b-47cb-ae55-041e381b6a61

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Keep Reading

PHR DEADLINE ALERT: Faruqi & Faruqi, LLP Reminds Phreesia (PHR) Investors of Securities Class Action Deadline on July 13, 2026

Old National Introduces ‘Team Old National’ PGA TOUR and NCAA Golf Ambassadors

LatiNation Media to Premiere Viral Comedy Star Jenny Lorenzo’s Sketch Series “The Best of Jenny Lorenzo”

Foresight Canada Names the Nation’s Top Cleantech Leaders at Web Summit Vancouver

TurboHome Debuts Interactive Prediction Game for the San Francisco Real Estate Market

The Denver Post Names American Indian College Fund a Winner of the Denver and Colorado Top Workplaces 2026 Award

Workable Launches MCP Server for AI-Powered Recruiting and HR Workflows

Sino and European Automakers Seek Common Ground on Powertrain Transition at Vienna Symposium

Acronis Introduces Cyber Frame, Addressing Service Provider Demand for Profitable, Reliable, and Protected IaaS

Editors Picks

Danielle Smith rejects Alberta judge’s ruling against separation petition as ‘anti-democratic’

May 13, 2026

YouTube is courting creators — and sponsors — with streaming shows

May 13, 2026

PHR DEADLINE ALERT: Faruqi & Faruqi, LLP Reminds Phreesia (PHR) Investors of Securities Class Action Deadline on July 13, 2026

May 13, 2026

Old National Introduces ‘Team Old National’ PGA TOUR and NCAA Golf Ambassadors

May 13, 2026

Latest News

LatiNation Media to Premiere Viral Comedy Star Jenny Lorenzo’s Sketch Series “The Best of Jenny Lorenzo”

May 13, 2026

Foresight Canada Names the Nation’s Top Cleantech Leaders at Web Summit Vancouver

May 13, 2026

Social media and AI ban for New Brunswick youth a possibility: Holt

May 13, 2026
Facebook X (Twitter) Pinterest TikTok Instagram
© 2026 Daily Guardian Canada. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version