Anthropic Mythos just broke the four-minute mile in cyber offense

Anthropic Mythos just broke the four-minute mile in cyber offense
New AI models such as Anthropic’s Claude Mythos have rapidly accelerated autonomous discovery and exploitation of zero-day vulnerabilities, producing hundreds of working exploits and collapsing time-to-exploitation to hours or less. Security leaders are urged to act immediately by integrating AI-driven defensive tooling, adopting continuous patching and automated response, and following operational guidance like the CSA’s “AI Vulnerability Storm” briefing to become “Mythos-ready” #AnthropicMythos #ProjectGlasswing

Keypoints

  • Anthropic’s Claude Mythos autonomously discovered and produced large numbers of working exploits (e.g., 181 working Firefox JS engine exploits versus two from a prior model) and found long-standing bugs in OpenBSD and FFmpeg.
  • Advances in general reasoning and code generation have emergent offensive capabilities, with experts estimating 9–12 months until advanced cyber-reasoning is widely distributed.
  • Anthropic restricted Mythos via Project Glasswing, but frontier and open-weight models already demonstrate autonomous vulnerability research, and tools like the Zero Day Clock show time-to-exploitation collapsing.
  • The Cloud Security Alliance, SANS, OWASP Gen AI Security Project and 250 security leaders produced the expedited “AI Vulnerability Storm” briefing mapping 13 risks to NIST CSF 2.0 and MITRE ATLAS and prescribing 11 priority actions, six rated critical with immediate deadlines.
  • Practical defensive steps recommended: integrate AI agents into code review and CI/CD, create joint governance for innovation, prepare for continuous patching, build automated response capabilities, and establish measurement frameworks for agents.
  • The window to build AI-driven defensive resilience is limited—teams that act now can close the gap between vulnerability discovery and response, while those that delay will face greater exposure.

MITRE Techniques

  • [N/A ] No explicit MITRE ATT&CK technique IDs or named ATT&CK techniques are mentioned in the article – ‘maps them to NIST CSF 2.0 and MITRE ATLAS’

Indicators of Compromise

  • [None ] The article does not list specific IOCs such as IP addresses, domains, file hashes, or filenames – no examples provided.


Read more: https://www.sysdig.com/blog/anthropic-mythos-just-broke-the-four-minute-mile-in-cyber-offense