Close Menu
Daily Guardian
  • Home
  • News
  • Politics
  • Business
  • Entertainment
  • Lifestyle
  • Health
  • Sports
  • Technology
  • Climate
  • Auto
  • Travel
  • Web Stories
What's On

The Denver Post Names American Indian College Fund a Winner of the Denver and Colorado Top Workplaces 2026 Award

May 13, 2026

Microsoft’s Edge Copilot update uses AI to pull information from across your tabs

May 13, 2026

Workable Launches MCP Server for AI-Powered Recruiting and HR Workflows

May 13, 2026

Sino and European Automakers Seek Common Ground on Powertrain Transition at Vienna Symposium

May 13, 2026

Acronis Introduces Cyber Frame, Addressing Service Provider Demand for Profitable, Reliable, and Protected IaaS

May 13, 2026
Facebook X (Twitter) Instagram
Finance Pro
Facebook X (Twitter) Instagram
Daily Guardian
Subscribe
  • Home
  • News
  • Politics
  • Business
  • Entertainment
  • Lifestyle
  • Health
  • Sports
  • Technology
  • Climate
  • Auto
  • Travel
  • Web Stories
Daily Guardian
Home » Sweet Security Launches Sweet Attack to Debunk The Myth Before Mythos Ships
Press Release

Sweet Security Launches Sweet Attack to Debunk The Myth Before Mythos Ships

By News RoomMay 13, 20265 Mins Read
Sweet Security Launches Sweet Attack to Debunk The Myth Before Mythos Ships
Share
Facebook Twitter LinkedIn Pinterest Email

NEW YORK, May 13, 2026 (GLOBE NEWSWIRE) — Anthropic’s release of the Mythos benchmark earlier this year crystallized an anxiety that has been building across enterprise security teams for the past eighteen months: attackers now wield AI-grade tooling that rivals — and in some cases exceeds — nation-state capability, with immediate knowledge of exploitable vulnerabilities at a pace defenders cannot match.

Mythos turned that fear into a benchmark, and boards are now asking CISOs for a number against it. Each generation of red-teaming has gotten closer — and stopped short. DAST probes applications from the outside. Human red teams bring skill, but episodically, and typically through ‘spray and pray’. AI red teams brought speed, but still guessed from outside — lacking the intimate organizational data that paves the way in.

In response, Sweet Security today launched Sweet Attack, an AI red-team agent with the data attackers wish they had. Sweet Attack operates like a navigator with live charts of terrain others can only guess at. Built on the execution-level runtime data Sweet has indexed since day one, Sweet Attack fuses context, intel, and semantic data into the layered attack paths an adversary would walk — at AI speed. It gives defenders the one capability Mythos cannot supply on its own: the power to navigate the unknown, not just name it.

“Cast & Crew has engaged tier-one offensive security firms for years. Sweet Attack surfaced exploitable attack paths in three days that prior engagements had not identified, and paired the findings with a concrete, prioritized remediation plan we were able to action immediately. The combination of depth and operational usability is what set the engagement apart.” — Tal Hornstein, Chief Information Security Officer, Cast & Crew Entertainment Services

“While we always had visibility into our vulnerabilities, we lacked the necessary context for consistent and effective prioritization. Our teams often struggled to balance endless remediations with product deadlines because validating every attack path was impossible. Sweet Attack changed this by quickly surfacing verified, exploitable paths. This shifted our focus from simply ‘remediating vulnerabilities’ to ‘preventing breaches’. In a world where AI accelerates the threat landscape, discovering and remediating these attack paths before attackers exploit them matters most.” — Birat Niraula, CISO, Auctane

Sweet Attack — How it Works

Even the most capable attackers spend 90% of their time guessing. Sweet Attack starts at a breaking advantage point where it has live, empirical, and indicative data trails. This includes: runtime topology, unencrypted Layer 7 exposure, deployed source code, identity paths, and live application behavior. 

Sweet Attack identifies openings across vulnerabilities, identity relationships, permissive scopes, exposed APIs, and unauthenticated endpoints, then probes them step-by-step to determine which combinations form exploitable attack chains. If a path can’t be exercised, it is abandoned. If it can, Sweet Attack continues until it overtakes the brick walls. Every chain is logged with reproducible evidence — including the runtime conditions that made it work. Because the agent operates in real production conditions, it only goes where there is a path worth walking.

Key capabilities

  • Continuous enumeration and execution of attack chains, in a controlled manner
  • L7-native: every API call, identity, prompt, and response indexed and replayable
  • Real production conditions — no synthetic environments, no assumptions
  • Audit-ready reporting on validated chains, exploitation steps, and remediation paths

“For two years the industry has been bracing for an attacker class moving at AI speed — with nation-state tooling and live knowledge of every exploitable seam. Mythos forced everyone to put a number on the gap. We can. Sweet Attack doesn’t model the threat — it safely executes it against the customer’s actual production environment and reports back what worked. The myth is that defenders can’t keep up with attack speed. Sweet Attack debunks it.” — Dror Kashti, CEO and co-founder, Sweet Security

Availability

Sweet Attack is generally available today to all Sweet customers. CISOs can put Mythos to the test in their environment — at full potential, harm-free, before the benchmark ships — at hi.sweet.security/attack.

Sweet Attack 2

About Sweet Security

Sweet Security is a leading security platform for dynamic cloud and AI environments. It enables organizations to see what matters, understand why it matters, and act on it instantly. By turning real-time behavior into clear decisions and controlled action, Sweet helps security teams move beyond detection to stop threats before they’re exploited. Built for the speed and complexity of modern cloud and AI systems, Sweet brings clarity, confidence, and control to environments that never stand still.

Sweet Security was founded by Dror Kashti, CEO, Eyal Fisher, CPO, and Orel Ben Ishay, VP R&D. Privately funded, Sweet is backed by Evolution Equity Partners, Munich Re Ventures, Glilot Capital Partners, CyberArk Ventures, and an elite group of angel investors. For more information, visit sweet.security.

Media Contact

Noa Glumcher, CMO Sweet Security [email protected]

Photos accompanying this announcement are available at:

https://www.globenewswire.com/NewsRoom/AttachmentNg/a3d1870d-2082-4165-b22e-9258dd8da2fb

https://www.globenewswire.com/NewsRoom/AttachmentNg/c2f0ea49-02f0-4e7c-a46c-e00fb5967a4d

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Keep Reading

The Denver Post Names American Indian College Fund a Winner of the Denver and Colorado Top Workplaces 2026 Award

Workable Launches MCP Server for AI-Powered Recruiting and HR Workflows

Sino and European Automakers Seek Common Ground on Powertrain Transition at Vienna Symposium

Acronis Introduces Cyber Frame, Addressing Service Provider Demand for Profitable, Reliable, and Protected IaaS

Foremost Clean Energy Announces Expansion of the Tuning Fork Uranium Zone at Hatchet Lake South

Diginex Appoints Archana Kotecha as Chief Impact Officer to Advance Human Rights and Scale Supply Chain Solutions in a $9.6B Market

Lofty Introduces Canva Integration to Help Agents Shorten Workflows and Eliminate Distribution Bottlenecks

EpicQuest Education Chairman & CEO Letter to Shareholders

ASUS Republic of Gamers to Celebrate 20 Years of Gaming Innovation at Computex 2026

Editors Picks

Microsoft’s Edge Copilot update uses AI to pull information from across your tabs

May 13, 2026

Workable Launches MCP Server for AI-Powered Recruiting and HR Workflows

May 13, 2026

Sino and European Automakers Seek Common Ground on Powertrain Transition at Vienna Symposium

May 13, 2026

Acronis Introduces Cyber Frame, Addressing Service Provider Demand for Profitable, Reliable, and Protected IaaS

May 13, 2026

Latest News

Foremost Clean Energy Announces Expansion of the Tuning Fork Uranium Zone at Hatchet Lake South

May 13, 2026

Diginex Appoints Archana Kotecha as Chief Impact Officer to Advance Human Rights and Scale Supply Chain Solutions in a $9.6B Market

May 13, 2026

Lofty Introduces Canva Integration to Help Agents Shorten Workflows and Eliminate Distribution Bottlenecks

May 13, 2026
Facebook X (Twitter) Pinterest TikTok Instagram
© 2026 Daily Guardian Canada. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version