Microsoft MDASH Beats A Key Mythos Benchmark. Here’s Why That Matters
✨ AI Summary
🔊 جاري الاستماع
InnovationEnterprise TechMicrosoft MDASH Beats A Key Mythos Benchmark. Here’s Why That MattersByTim Keary,Contributor.Forbes contributors publish independent expert analyses and insights. Tim Keary is a reporter covering enterprise AI adoption.Follow AuthorMay 15, 2026, 12:52pm EDT--:-- / --:--This voice experience is generated by AI. Learn more.This voice experience is generated by AI. Learn more.Microsoft MDASH outperforms Mythos on a key benchmark. Image shows a male and female engineer using a laptop.gettyClaude Mythos has dominated the conversation around cybersecurity since Anthropic’s Project Glasswing announcement, but Microsoft is striking back. On Tuesday, the tech giant unveiled MDASH, also known as Microsoft Security multi-modal agentic scanning harness. MDASH is not only the first multi-modal service to be included in the CyberGym benchmark, an AI security benchmark developed by UC Berkeley’s Center for Responsible, Decentralized Intelligence, but it actually beat Mythos Preview, scoring 88.4% compared to 83.1%.CyberGym is a benchmark designed to assess the capabilities of AI agents on real-world vulnerability analysis tasks. It includes 1,507 real-world vulnerabilities across 188 open-source projects. The fact that MDASH outperformed Mythos Preview indicates that it is significantly more effective at identifying vulnerabilities. One of the key differentiators of MDASH is that it isn’t a single model, but an agentic vulnerability discovery and remediation system that runs over 100 specialized agents. These agents have segmented tasks, with some hunting for vulnerabilities and others debating whether flaws discovered are real or exploitable. MDASH Takes On Mythos Microsoft’s announcement comes not just after the limited release of Mythos Preview in April, but the same week that OpenAI announced Daybreak, a security initiative that will provide companies with access to cyber-permissive models to help discover vulnerabilities in critical software. MORE FOR...





