Redshell — Turn on cybersecurity
Back to articlescybersecurity

AI Arms Race: Claude Mythos Discovers Thousands of Zero-Days as Threat Actors Weaponize Same Capabilities

Anthropic's Claude Mythos Preview has identified thousands of critical zero-day vulnerabilities in major operating systems and browsers. Security experts warn this breakthrough signals a dangerous shift where attackers will soon discover exploits faster than defenders can respond, fundamentally changing vulnerability landscapes.

May 4, 20268 min read
AI Arms Race: Claude Mythos Discovers Thousands of Zero-Days as Threat Actors Weaponize Same Capabilities

The AI Vulnerability Breakthrough Nobody Wanted

The cybersecurity industry faces an unprecedented crisis: artificial intelligence systems can now discover zero-day vulnerabilities faster than human security teams can patch them. Over the past few weeks, Anthropic's Claude Mythos Preview has identified thousands of zero-day vulnerabilities, many of them critical, in every major operating system and every major web browser, along with a range of other important pieces of software.

This development, disclosed as part of Project Glasswing, represents a fundamental inflection point in the cybersecurity arms race. For the first time, defenders and attackers have access to the same AI-powered vulnerability discovery capabilities, but attackers operate with fewer ethical constraints.

What Claude Mythos Preview Achieved

Claude Mythos Preview has been used to identify complex vulnerabilities that prior-generation models missed entirely, signaling a dangerous shift where attackers can soon find even more zero-day vulnerabilities and develop exploits faster than ever before.

Anthropic demonstrated this capability by disclosing technical details of a subset of vulnerabilities that have already been patched, and in some cases showing the ways Mythos Preview found to exploit them. The implications are staggering: if defenders can use AI to find critical flaws in their own infrastructure, so can threat actors use identical or similar models to identify exploits before vendors even know vulnerabilities exist.

The Speed of Exploitation Has Fundamentally Changed

The threat landscape has shifted dramatically. AI can now find and exploit zero-days in minutes, with threat actors able to discover and exploit zero-day vulnerabilities in minutes thanks to artificial intelligence in their toolkit, placing organizations across every sector at serious risk.

For years, finding a zero-day required deep technical skill, long research cycles, and heavy resources, with only well-funded nation-state groups or elite crews able to do it consistently—but that barrier no longer holds.

AI has made zero-day discovery faster, cheaper, and accessible to a wider range of attackers, including those without coding knowledge. This democratization of exploit development represents an existential threat to the traditional vulnerability disclosure and patching model.

How AI-Powered Attacks Operate

An attacker today gives an AI model a target, and the model independently scans the network, hunts for weaknesses, attempts exploits, and switches paths when one fails; through standards like the Model Context Protocol, AI agents connect to real environments and execute full attack chains with minimal human input.

This represents a complete departure from traditional penetration testing workflows. Rather than skilled operators spending weeks or months identifying and exploiting a single target, AI agents can now autonomously identify multiple exploitation paths, adapt to defensive measures, and execute attacks at machine speed with minimal human oversight.

Industry Leaders Sound the Alarm

Cybersecurity leaders recognize that Claude Mythos Preview's ability to find previously hidden vulnerabilities is a game changer for finding vulnerabilities, but also signals that attackers can soon find even more zero-day vulnerabilities and develop exploits faster than ever before.

The stakes are extraordinarily high. Organizations that previously relied on \"security through obscurity\" or delayed patching cycles now face opponents that can identify and exploit vulnerabilities at machine speed, before traditional disclosure and patching processes can even begin.

The Defender's Paradox

Anthropic and its security partners face an uncomfortable reality: releasing AI vulnerability discovery tools helps defenders find and patch flaws before attackers exploit them. But the same technology inevitably reaches threat actors, either through reverse engineering, open-source implementations, or direct adoption of commercial models.

Claude Mythos Preview demonstrates what is now possible for defenders at scale, and adversaries will inevitably look to exploit the same capabilities—that is not a reason to slow down; it's a reason to move together, faster.

This represents the core challenge of the 2026 threat landscape: defenders must adopt AI-powered vulnerability discovery to stay ahead, but adoption of these tools by the defender community will inevitably accelerate adoption by threat actors.

What This Means for Critical Infrastructure

Organizations managing critical infrastructure face a compressed timeline. The traditional vulnerability management cycle—discovery, vendor notification, patch development, testing, and deployment—now occurs under extreme time pressure. Sophisticated threat actors can potentially identify exploitable flaws in deployed systems faster than security teams can identify the same vulnerabilities themselves.

This creates a cascading risk: once an AI system identifies a zero-day in widely-deployed software, any organization running that software becomes vulnerable to rapid exploitation by multiple threat actors competing for the same target.

The Path Forward: Continuous Exploitation Readiness

The cybersecurity industry cannot respond to AI-powered vulnerability discovery using traditional approaches. Organizations must:

  • Adopt continuous vulnerability discovery using AI tools themselves
  • Implement automated patching for critical vulnerabilities in days, not weeks
  • Deploy compensating controls and network segmentation to contain exploitation attempts
  • Establish zero-trust architectures that assume compromise is inevitable
  • Invest in threat hunting and detection capabilities designed for AI-driven attacks

The era of vulnerability management based on CVE release cycles and scheduled patch deployments is ending. Organizations that cannot move to continuous patching, automated detection, and rapid incident response will increasingly become victims of AI-accelerated attacks.

Critical Vulnerabilities Discovered Include

While Anthropic has not disclosed the complete list of vulnerabilities identified by Claude Mythos Preview, security researchers report that flaws were discovered across multiple software categories including:

  • Operating system kernel vulnerabilities
  • Web browser security mechanisms
  • Cryptographic implementations
  • Authentication systems
  • Privilege escalation vulnerabilities

The breadth of discoveries indicates that Claude Mythos Preview operates with exceptional effectiveness across diverse codebases and vulnerability classes.

Industry Response and Collaboration

Anthropic is not attempting to monopolize this capability. CrowdStrike is part of Project Glasswing from day one, indicating that major security vendors are collaborating to understand and respond to the implications of AI-powered vulnerability discovery.

AWS has also committed resources to the effort. AWS is building defenses before threats emerge, with security embedded continuously in everything they do; AWS teams analyze over 400 trillion network flows every day for threats, with AI central to their ability to defend at scale.

The Closing Window for Traditional Vulnerability Management

The cybersecurity industry stands at an inflection point. The traditional 90-day patch window, quarterly security assessments, and vulnerability prioritization based on CVSS scores are becoming obsolete. When AI systems can identify and exploit vulnerabilities in minutes, organizations must respond with equivalent speed and automation.

For defenders, Claude Mythos Preview and similar tools represent an opportunity to identify and remediate flaws before attackers do. For threat actors, the same technology represents unprecedented access to zero-day vulnerabilities at machine scale. The outcome will likely depend on which side moves faster to operationalize AI-powered vulnerability discovery across their infrastructure.

The cybersecurity arms race has entered a new phase, and the velocity of exploitation has fundamentally changed.

Stay in the loop

New articles and curated links—no spam.

Comments

Sign in to leave a comment

By commenting you agree to our guidelines: be respectful, no spam, no offensive language or explicit content.

Be the first to comment.