The AI Vulnerability Storm
AI, as demonstrated by Anthropic's Mythos, has significantly increased the likelihood of attackers discovering new vulnerabilities, creating new exploits, and using them in complex automated attacks at scale. And while AI also increases the speed of patch development and reduces defects in new software, defenders still face a heavier relative burden due to the inherent limitations of patching. Attackers gain asymmetric benefits.
Gadi led the writing of this briefing for the Cloud Security Alliance, alongside SANS, [un]prompted, and the wider security community. Read the full paper here.
Why the Defender Timeline Is Breaking
AI-driven vulnerability discovery has been accelerating for more than a year. Mythos compresses the timeline further, but the capability is not new, and waiting for the next major announcement is not a strategy. The window between discovery and weaponization has collapsed to hours. Security programs built on weeks-long patch cycles, quarterly pen tests, and CVE-based threat intelligence were not designed for this speed.
What the Paper Covers
The briefing is a working document for CISOs who need to walk into a room Monday morning with a credible plan. It is organized around two questions: what to do now to deal with the current risk spike, and what to start now to be ready for the waves that follow.
On the current risk spike, the paper recommends:
- Adjusting risk calculations and re-orienting security program resources for the increasing volume of patches, decreasing time to patch, and more persistent and complex attacks.
- Focusing on the basics and hardening your environment further. Segmentation, egress filtering, multifactor authentication, and defense-in-depth all continue to increase the difficulty for attackers.
- Prioritizing robust dependency management to reduce vulnerabilities in third-party and open-source components.
On getting ready for what comes next, the paper recommends:
- Enforcing automated security assessments consistently in your development processes, including using LLM-powered agents to find vulnerabilities before attackers do.
- Introducing AI agents to the cyber workforce across the board, enabling defenders to match attackers' speed and begin closing the gap.
- Re-evaluating your risk tolerance for operational downtime caused by vulnerability remediation, to account for shorter adversary timelines.
- Updating governance for more efficient vendor onboarding and increasing headcount to facilitate faster deployment of new AI-based defenses.
The paper also introduces the concept of a Mythos-ready security program built around minimum viable resilience, and frames VulnOps as a permanent organizational capability, the vulnerability-side analogue to DevOps. It includes a prioritized action plan with start dates and time horizons, and board-facing language to support the executive conversation that is already happening.
Why This Matters
This is not about one model, one vendor, or one announcement. The current wave of vulnerability disclosures from Project Glasswing is the first of many, and the capabilities seen in Mythos will become more widely available in the months ahead. The organizations that fare best will be the ones that begin building the muscle now: the processes, the tooling, and a culture willing to adopt AI as a core part of how security gets done.
As an industry, we also need to strengthen our coalitions, cooperation, and coordination. Attackers already operate as collectives. Defenders need to catch up.
Who Wrote It
The paper was led by Knostic CEO Gadi Evron, with co-authors Rich Mogull (Chief Analyst, Cloud Security Alliance) and Rob T. Lee (Chief AI Officer, SANS Institute). Contributing authors include Jen Easterly, Bruce Schneier, Chris Inglis, Rob Joyce, Heather Adkins, Joshua Saxe, Sounil Yu, John N. Stewart, Katie Moussouris, Dave Lewis, and Maxim Kovalsky. The paper was produced by the CSA CISO Community, SANS, [un]prompted, the OWASP Gen AI Security Project, and the wider community.
More than 250 CISOs redlined the document live. All contributors represent themselves, not their employers.
Read the Paper
The "AI Vulnerability Storm": Building a "Mythos-ready" Security Program Cloud Security Alliance, April 12, 2026. Released under CC BY-NC 4.0.
Download the paper here
For inquiries: cisos@cloudsecurityalliance.org
Discover and Protect Agents and Coding Assistants
Check out what we do at Knostic to defend your agents, prevent them from deleting your hard drive and code, and control associated supply chain risks such as MCP servers, extensions, and skills. Visit knostic.ai for more information.
Subscribe to our blog!
Tags: