What Anthropic’s Claude Mythos means for your organisation’s cyber risk and what to do about it before attacker’s act.
THE BOTTOM LINE
- AI can now discover software vulnerabilities faster than most organisations can fix them.
- The gap between a weakness existing and being exploited has collapsed from months to hours.
- Organisations still relying on annual reviews and periodic patching are already behind.
- The right response is not alarm. It is acceleration: continuous monitoring, faster remediation and an integrated security model built for this environment.
What Has Changed
On 7 April 2026, Anthropic announced Claude Mythos Preview, a general-purpose AI model that has demonstrated the ability to autonomously discover and exploit software vulnerabilities at a scale and speed not seen before.
In internal testing, Mythos identified thousands of previously unknown vulnerabilities across every major operating system and web browser, including flaws that had survived decades of human security review. Engineers with no formal security training were able to produce working exploits using a prompt that amounted to: find a vulnerability in this programme.
Anthropic has restricted access to a controlled group of industry partners through Project Glasswing, which includes Microsoft, Google, Amazon and Cisco, precisely because the capability is considered too significant for general release at this stage.
The concern for businesses is not simply that AI will create more attacks; it is that AI makes existing attack paths far easier and faster to find. That changes the risk equation for every organisation operating digital infrastructure.
The Speed Problem Is the Business Problem
Most organisations were designed for a threat environment where defenders had time:
- For annual Penetration Tests
- Time for monthly patching cycles
- Time to assess risk before deciding whether to act
That time is now significantly reduced.
AI-powered vulnerability discovery compresses the timeline between a weakness existing and an attacker becoming aware of it. At scale, it also overwhelms traditional remediation capacity. The Edgescan Vulnerability Statistics Report 2025 already shows that over 45% of vulnerabilities discovered in large organisations remain unpatched after 12 months. Mythos-class tools do not wait 12 months.
|
Old Threat Environment |
AI-enabled Threat Environment |
|
Months between discovery and exploitation |
Hours between discovery and exploitation |
|
Skilled attackers required to find zero-days |
Engineers with no security training can generate working exploits |
|
Annual Pen Test captures a point-in-time view |
Continuous discovery means the attack surface is never static |
|
Patching backlog is manageable with monthly cycles |
Volume of AI-discovered vulnerabilities overwhelms patch capacity |
|
Defenders and attackers operate at similar speeds |
Attackers gain an asymmetric advantage from automation |
The reality is simple: today's threat environment demands more than periodic reviews and reactive remediation.
"If Anthropic's Claude Mythos is even half as effective as early reports suggest, the cyber security landscape is about to undergo a monumental shift once capabilities like this are weaponised by threat actors. Mythos is only the first of a new generation of highly advanced, cyber security-focused AI models capable of accelerating cyber attacks at unprecedented speed and scale. OpenAI's Daybreak being another. It is clear, the pace of change is now AI-powered."
- Luke Elston, Microsoft Practice Director
What Your Board Should Be Asking Right Now
This is not a question for the IT team alone, cyber risk at this speed is a business continuity question, a regulatory question and a reputational question. If you are a board member, executive or senior leader, these are the questions worth asking this week:
BOARD-LEVEL QUESTIONS
- Do we have a live view of our internet-facing attack surface?
- Are we continuously monitoring our Microsoft 365 and Entra ID environment?
- How quickly can we detect and contain abnormal behaviour?
- Do we know which of our vulnerabilities are exploitable right now?
- Can we act outside normal business hours without waiting for escalation?
- Are our third-party suppliers managing their own exposure?
- When did we last test our incident response plan under realistic conditions?
- Does our current security model depend on periodic reviews or continuous monitoring?
If any of those answers are unclear, the organisation has exposure it may not be able to quantify yet, which is the risk Mythos makes visible.
Where Organisations Are Most Exposed
Mythos does not create new categories of vulnerability. It finds weaknesses that already exist, faster and at greater scale than was previously possible. That means the organisations with the greatest exposure are those that already have gaps they have not closed.
The highest-risk areas in most organisations are:
- Legacy systems and end-of-life software that cannot be patched quickly or at all
- Weak Microsoft 365 and Entra ID configurations, a frequent attacker entry point
- Internet-facing infrastructure that is not continuously monitored
- Remote access tools, VPNs and firewalls with known or unpatched vulnerabilities
- Third-party software dependencies and supply-chain exposure
- Poor asset visibility, where the organisation does not have a complete picture of what is exposed
- Slow remediation cycles that leave known vulnerabilities open for extended periods
For regulated sectors including financial services, healthcare, legal, utilities and public sector, the stakes are compounded by regulatory obligations. Cyber security can no longer be treated as a compliance exercise. It has to operate as a continuous, intelligence-led discipline.
"Claude Mythos is a signal that the security industry cannot afford to ignore. When AI can discover and chain together exploitable vulnerabilities faster than most organisations can patch them, the traditional model of periodic reviews and annual penetration tests is no longer fit for purpose. This is not a technology problem — it is a business continuity, regulatory and reputational question that belongs at board level. The organisations that respond well will be those that move now to continuous monitoring, faster remediation and an integrated security model. The ones that wait will find out the hard way that attackers do not observe annual review cycles."
- Dominic List, CEO & Founder
Who Carries the Highest Risk
The risk is not evenly distributed. Some sectors face a significantly higher threat due to a combination of high attacker interest, complex legacy environments and slower remediation cycles.
- Financial Services: Complex, legacy-heavy environments with high-value data and growing regulatory pressure from bodies including the FCA and BaFin. Reuters has reported that banks using Mythos-class tools are finding scores of previously unknown weaknesses, including lower-severity vulnerabilities that chain together into serious exploit paths.
- Healthcare & NHS Suppliers: High operational impact if disrupted, with estates that frequently include end-of-life clinical systems that cannot be taken offline for patching.
- Local Government & Public Sector: Limited cyber budgets, fragmented IT estates and constrained change-control processes mean remediation often lags significantly behind disclosure.
- Critical National Infrastructure energy, utilities, telecoms and transport. High consequence if compromised, and frequent targets for pre-positioning by nation-state actors.
- Defence & Government Suppliers: Attractive espionage targets. A supplier compromise can provide covert access to sensitive government systems and policy information without a direct attack on the department itself.
- Managed Service Providers & Software Vendor: Supply-chain amplification risk. A single exploit path in widely deployed tooling can expose hundreds or thousands of downstream organisations simultaneously.
- Mid-Market Businesses: Often too complex to be simple targets, but too underfunded to sustain mature security operations. This combination is increasingly attractive to attackers using automated discovery tools.
Beyond Ransomare: The Espionage Dimension
Most cyber security conversations focus on ransomware and data theft. The Mythos capability introduces a more significant risk for government, defence and regulated sectors: covert persistent access.
A hostile state using Mythos-class capability does not need to launch a visible attack. It needs to accelerate reconnaissance, discover exploitable weaknesses quietly and establish a foothold that goes undetected. The goal is persistent access to government networks, defence contractor systems, policy intelligence, citizen datasets and critical infrastructure — not immediate disruption, but leverage for future use.
For organisations in those sectors, continuous monitoring and rapid detection are not just operational disciplines. They are the primary defence against a threat that may already be present and is not designed to announce itself.
There Is Also a Defensive Opportunity
It is important not to read Mythos as a purely negative development. The same capability that accelerates attacker discovery also helps defenders find and fix vulnerabilities before those attackers do. Mozilla reportedly used Mythos Preview to identify 271 Firefox vulnerabilities, which were then patched. Project Glasswing exists precisely to give defenders a structured head start.
The strategic question is whether your organisation has the operational maturity to act on what AI-assisted discovery surfaces. Finding thousands of issues is not useful if the business cannot prioritise, validate and remediate at pace. The defensive advantage only materialises for organisations that have already built the infrastructure to use it.
What Good Looks Like Now
The right response to Mythos is not a new tool purchase or an urgent board presentation. It is a structured shift in how security operates day-to-day.
Organisations that will manage this environment best are those that combine continuous monitoring, fast remediation, operational depth and executive visibility, working together as one integrated function rather than separate disciplines that connect only when something goes wrong.
The 9 Practical Steps That Make the Biggest Difference
- Move to continuous monitoring: Periodic reviews no longer reflect the current threat environment. Visibility needs to be real-time across cloud, endpoint, email and network.
- Know your attack surface: You cannot protect what you cannot see. A live view of internet-facing assets, identity exposure and third-party dependencies is the foundation.
- Prioritise what is actually exploitable: Not every vulnerability is equal. The focus should be on findings that represent real, active risk, not just theoretical exposure.
- Harden your Microsoft environment: Microsoft 365 and Entra ID configurations are among the most targeted areas in any organisation. Hardening identity and endpoint controls significantly reduces attacker options.
- Test your response model: Knowing you have monitoring in place is not the same as knowing it works under pressure. Regular testing of incident response plans, including out-of-hours scenarios, is essential.
- Bring Security & Operations Together: The organisations that contain threats fastest are those where security and network operations work as one team, not separate functions that hand off to each other mid-incident.
- Test Exploitability, Not Just Severity Scores: CVSS scores measure theoretical severity. They do not tell you whether a specific vulnerability is reachable and exploitable in your environment. Prioritise based on real-world exploitability, not just ratings.
- Enforce Least Privilege & Privileged Access Management: Excessive permissions are what turn a single compromised account into a domain-wide incident. Reduce standing access, enforce just-in-time privilege and audit privileged accounts regularly.
-
Improve Network Segmentation: One compromised system should not mean full network access. Segmentation limits the blast radius of an attack and is one of the most effective controls against lateral movement by an attacker that has already gained an initial foothold.
How CyberOne Helps
CyberOne is a Microsoft Security Elite Partner, with services are built for exactly the kind of continuous, integrated security model that the Mythos environment demands.
Through our SNOC (Security and Network Operations Centre) model, we bring security monitoring, threat detection, network operations and incident response into one aligned team. That means when a threat is identified, the right expertise is already in place to investigate, contain and remediate without delay or unnecessary handoffs to disconnected providers.
CyberOne help organisations:
- Establish and maintain a live view of their external attack surface
- Continuously monitor Microsoft Defender and Sentinel environments through MXDR-as-a-Service
- Identify and prioritise exploitable vulnerabilities, not just theoretical risk
- Harden Microsoft 365, Entra ID and endpoint configurations through a Microsoft 365 Security Review or Microsoft Secure Score Rapid Remediation Professional Services
- Cyber Incident Response to threats 24x7x365, including outside business hours
- Give boards and leadership teams clear, actionable visibility of cyber risk and maturity
- Move from periodic assurance to continuous operational resilience
If you want to understand where your organisation stands today, how your Microsoft environment is configured, where your greatest exposure lies and what needs to change, our team can help you assess that clearly and practically.
The Practical Question
Mythos does not create a theoretical future risk. It reflects a capability that exists now, is already being evaluated by the world’s largest technology organisations and will become more widely available over time.
The organisations that respond well will be those that treat this as the operational signal it is: time to move from periodic security to continuous resilience, from reactive response to integrated detection and containment.
The organisations most exposed will be those that file this under ‘something to monitor’ and return to it at the next annual review.