The cybersecurity industry may have just had its “ChatGPT moment”. Unveiled in early April, Anthropic’s new Claude Mythos Preview model has apparently found thousands of high and critical-severity zero-day flaws in open source and proprietary software – some dating back over 20 years. In so doing, it promises to collapse the exploitation window during which network defenders scramble to patch before their adversaries. Anthropic’s decision to use the model in Project Glasswing – where vendors will use the tech to find and fix novel vulnerabilities – will cause yet more disruption.

It’s hard to overstate the impact this will have on security teams. But they have one thing on their side. The story has broken through to the boardroom. This could be a golden opportunity to secure funding and resources for a new era of AI-driven vulnerability management.

What Does This Mean for CISOs?

Even if Mythos is successfully kept out of the hands of hackers, other models by other vendors will not be. There are major implications for CISOs:

  1. In the short term, teams will likely be inundated with emergency patches from vendors signed up to Project Glasswing.
  2. State actors may look to use any stockpiled zero-day exploits relatively soon, before AI-driven discovery renders them worthless.
  3. In the longer term, CISOs can expect Mythos-like capabilities to get into the hands of cybercriminals and state actors. This will “dramatically increase” the number and frequency of complex, novel attacks, according to a new industry report.

How Good Is Mythos?

According to the report – produced by the Cloud Security Alliance (CSA), OWASP, SANS and others – Mythos represents a “step change” in AI-driven vulnerability discovery and exploitation. It claims that models of this sort are different because they are:

  • More autonomous and reliable, developing exploits autonomously without the need for “scaffolding” – the external code and guardrails that LLMs often need to function
  • Able to identify complex, chained vulnerabilities
  • Able to do it all with a single prompt

However, after testing Mythos, the UK’s AI Security Institute (AISI) has some important caveats. It revealed in a new report that, on “expert-level” capture-the-flag tasks, Mythos Preview succeeds 73% of the time. However, real-world cyber-attacks are far more complex. That’s why the AISI built “The Last Ones” (TLO): a 32-step corporate network-attack simulation which runs from initial reconnaissance to full network takeover. It would take a human around 20 hours to complete. While Mythos was the first model to solve TLO from start to finish, three times out of 10. More inference compute may achieve even better performance, the AISI said.

More importantly, the institute said this only proves that Mythos is capable of “autonomously attacking small, weakly defended and vulnerable enterprise systems where access to a network has been gained.” In the real world, things should be far more difficult thanks to the presence of “active defenders and defensive tooling”.

Preparing for a Post-Mythos Era

In the meantime, the AISI recommended security teams to focus on the basics: “regular application of security updates, robust access controls, security configuration, and comprehensive logging.” It also pointed to defensive use of frontier AI for things like:

  • System hardening, via continuous scanning, discovering flaws and misconfigurations, mapping attack paths and testing exploitability
  • Improving threat detection and investigation by triaging, spotting patterns in logs and writing report summaries
  • Automating response actions like blocking traffic, quarantining processes and revoking user access

Bridewell CTO, Martin Riley adds that CISOs should start with continuous threat exposure management (CTEM) as a matter of urgency.

“Asset inventory, attack surface prioritisation, control validation, and mobilisation to remediate. If you do not have continuous visibility of your exposure, you are flying blind,” he tells IO (formerly ISMS.online). “Second, stress test your detection against threats you have never seen. Invest in anomaly-based detection and deep network telemetry. Signature-based approaches will not catch AI-generated exploit chains.”

CISOs must also steel their teams for a period of “sustained operational intensity”, Riley warns.

“The CSA paper rightly highlighted burnout as an operational risk. CISOs need to plan capacity, request headcount, and accelerate the use of AI agents within their own teams to keep pace,” he argues. “Finally, harden the fundamentals. Segmentation, egress filtering, phishing-resistant MFA, and defence in depth. These controls increase the cost of exploitation regardless of how the vulnerability was discovered. Maturity is not something you build overnight. The time to invest is now.”

Existing Frameworks as a Foundation

Jeff Williams, founder of OWASP and CTO of Contrast Security, argues that existing best practice standards and frameworks like ISO 27001 and NIST CSF can play a part in the transition to a post-Mythos world.

“Existing frameworks can help here, but mostly as a list of conceptual desired outcomes. They require governance, visibility, control, detection, response, and continuous improvement,” he tells IO. “But in a post-Mythos world where both developers and attackers are hyper-accelerated with AI, almost every activity those frameworks imply has to be reimagined to drive those outcomes with AI enhanced workflows.”

This is not about doing the same work faster, but rather transforming “periodic, manual, check-the-box security” into something that is “more continuous, more machine-readable, and more defensible”, he continues.

“CTEM, AI-assisted detection, runtime security, and continuous observation are how you turn those framework ideas into a real assurance case that security is actually correct and effective across both development and operations,” Williams argues.

Pukar Hamal, founder and CEO of SecurityPal AI, also sees a role for ISO 27001, NIST CSF, SOC 2 and even Cyber Essentials. “They are still good starting points because they force the basic discipline most organisations still don’t have: an inventory of what you own, a sense of who can touch it, and a documented way to respond when something breaks,” he tells IO. “None of that goes away in a post-Mythos world.”

However, CISOs will need to build their post-Mythos security strategy around continuous assurance not periodic attestation.

“The smartest security leaders I talk to are already treating ISO 27001 as the floor and quietly building the second layer themselves,” he concludes.

Expand Your Knowledge

Podcast: Phishing for Trouble Episode #08: Safe Software, Safer Business

Guide: Securing the AI Attack Surface

Blog: Why Regulators and Investors Expect Companies to Address a Triple Risk