The AI Vulnerability Storm Is Here. Is Your Security Program Ready?
What You Need to Know
A new AI system called Claude Mythos has just done something that no tool has ever done before :: autonomously discovered thousands of critical vulnerabilities across every major operating system and browser, and generated working exploits without a single human guiding it. This changes how attackers operate. It also changes what every security team needs to do, starting now.
There is a concept in weather forecasting called a "weather bomb" i.e. a rapid, violent intensification of a storm that catches most people off guard because the individual warning signs looked manageable right up until they weren't.
That is roughly where cybersecurity stands today.
On 7 April 2026, Anthropic announced Claude Mythos Preview and something called Project Glasswing. The announcement made headlines beyond the usual security circles. It reached boardrooms. It reached regulators. And for good reason.
Mythos did not just find vulnerabilities. It generated 181 working exploits for Firefox in internal testing, under conditions where earlier AI models succeeded twice. It identified complex chains of vulnerabilities involving multiple memory corruption bugs combined into a single attack path. And it did much of this with a single prompt, without needing elaborate technical setup or human assistance.
Among the findings: a bug in OpenBSD that had gone undetected for 27 years. Mythos generated working exploits at a 72% success rate. The AI vulnerability storm was not a future risk. It arrived on a Tuesday in April.
What Made Mythos Different
AI-assisted vulnerability discovery is not new. The trajectory has been building for over a year.
In mid-2025, an autonomous offensive security platform called XBOW topped the HackerOne leaderboard, becoming the first system to outperform all human hackers on the platform. Google's Big Sleep project discovered 20 real zero-days in open source projects. DARPA's AI Cyber Challenge found 54 vulnerabilities in four hours across 54 million lines of code.
By February 2026, Anthropic's own Claude Opus 4.6 had reported more than 500 high-severity vulnerabilities in open source software. One finding included a CVSS 9.8 flaw in OpenSSL that had existed since 1998. Separately, researchers documented an AI-based attack that reached admin-level access in eight minutes.
Mythos moved the needle again, and significantly.
Three things set it apart. First, it works without scaffolding, no elaborate configuration, no step-by-step prompting. Second, it chains complex vulnerabilities together, finding multi-step attack paths that simpler tools miss. Third, it operates at a speed and scale that simply outpaces human-led security processes.
The window between a vulnerability being discovered and a working exploit existing has, in the language of one industry report, "collapsed into hours." A year ago, defenders could reasonably expect days or weeks to respond before attackers weaponised a vulnerability. That assumption no longer holds.
The Problem With Patching
Here is where the asymmetry becomes uncomfortable.
AI helps defenders too. It speeds up patch development. It can reduce defects in new code. But the moment a vulnerability is publicly known, the patching process still requires human coordination, testing, change approvals, deployment, and validation. That process has an irreducible minimum. The attacker's side does not have that constraint.
This is the structural shift. Attackers gain disproportionate benefit from AI because their workflow does not carry the operational weight that patching does.
Project Glasswing was Anthropic's attempt to address part of this. They gave early access to Mythos to around 40 critical infrastructure providers, industry partners, and open source maintainers, so those organisations could patch their own products before broader exposure. It was described as possibly the largest multi-party vulnerability coordination effort in history.
It was also, by the report's own assessment, not enough on its own. The world's exploitable attack surface is far larger than what any partner ecosystem can cover. And as comparable offensive AI capabilities become available in other frontier models (estimated within months), and in open-source tools (estimated within six to twelve months), the defensive advantage of early access programs narrows quickly.
What "Mythos-Ready" Actually Means
The Cloud Security Alliance, SANS, OWASP, and a wide group of CISOs and practitioners released a joint strategy briefing on the same day as the Mythos announcement. Their framing is useful.
Being "Mythos-ready" does not mean having the most sophisticated AI tooling in place immediately. It means building the muscle now — the processes, the tooling, and the cultural willingness to adapt.
In practical terms, the recommendations fall into a few clear categories.
Go back to basics, seriously. Segmentation, patching known vulnerabilities, multi-factor authentication, Zero Trust architecture, egress filtering, and identity and access management. These controls increase the difficulty for attackers and contain the blast radius when something does go wrong. With AI-driven attacks compressing time to exploitation, these basics are more valuable now, not less.
Use AI offensively, for yourself. LLM-based vulnerability discovery tools are already mature enough to use. Start by running an AI-assisted security review of your own code. The same capabilities that make Mythos dangerous can be pointed inward, finding your weaknesses before an adversary does.
Treat your incident response capacity as a current risk. The volume of vulnerability disclosures following Mythos-class capability will not resemble anything security teams have handled before. Playbooks need updating. Tabletop exercises should now simulate multiple simultaneous high-severity incidents within the same week, because that is what the coming patch cycle may look like. Automation of remediation, wherever possible, should be a priority.
Fix your risk metrics. Many organisations are carrying risk calculations built for a world where time-to-exploitation was measured in days. That world is gone. Update your assumptions. The focus should shift toward containment speed, blast radius control, and recovery time, rather than breach prevention alone.
Protect your people. This one is easy to skip when the technical pressure is high. Security teams are absorbing an exponential increase in workload at the same time they are being asked to integrate AI into their own workflows. Burnout and attrition in security functions represent a direct operational risk. The expertise needed to navigate this period takes years to develop. Request additional headcount and budget for reserve capacity now, before the first waves of Glasswing-related patches arrive.
The Boardroom Has Noticed
For those in security leadership, the Mythos announcement has created an unusual opening.
Board-level awareness of AI-driven cyber risk is now real in a way it was not six months ago. The same AI capability that reached mainstream news is also the business opportunity that every executive wants to move faster on. That tension, between AI accelerating the business and AI accelerating attackers, is now a boardroom conversation.
The case for investment in security programme resilience has never been easier to make. The risk is documented. The path forward is concrete. The 90-day priorities are clear.
We Have Done This Before
One useful parallel offered in the CSA strategy briefing is Y2K.
It was a systemic threat with a hard deadline. The security and technology industry met it through coordinated, disciplined effort. Many people at the time thought the scale of response was disproportionate. In retrospect, the coordinated effort was precisely what prevented serious disruption.
This moment is the same kind of problem. The tools available to defenders are more powerful than they were in 1999. The coordination infrastructure exists. What is required now is the same disciplined prioritisation and investment.
The vulnerability storm has arrived. The organisations that will weather it well are not the ones that wait for the full picture before acting. They are the ones that start strengthening their foundations this week, put AI in the hands of their defenders today, and build the coalition habits that sustain resilience through the waves that follow.
Go Deeper
This article draws from a joint strategy briefing published on 12 April 2026 by the Cloud Security Alliance, SANS, and OWASP, with contributions from senior security leaders across Google, NSA, CISA, and the private sector. It includes a full risk register, priority action table, and board briefing templates.
About AKATI Sekurity:
AKATI Sekurity is a global MSSP and cybersecurity firm headquartered in Malaysia, with presence across five continents. Our services span VAPT, red team operations, DFIR, GRC, and managed security operations for clients in financial services, critical infrastructure, and enterprise sectors.
Explore our services: Penetration Testing | Red Team Services | Incident Response & DFIR | GRC Services