There was a session at BSides Luxembourg that I keep thinking about. Presented by Catalin Tiganila, CSA Luxembourg Chapter President, it was called The AI Vulnerability Storm: Building a Mythos-Ready Security Program. And the reason it stayed with me is because it was not built on speculation. It was built on something that had already happened and something that the security industry is only beginning to process.
What Happened on April 8, 2026
On April 8, 2026, Anthropic announced Claude Mythos Preview — a frontier AI model that autonomously discovered and wrote working exploits for thousands of zero-day vulnerabilities across every major operating system and web browser. Capabilities that Anthropic determined were too dangerous for general release. The company withheld the model rather than ship it. That decision is its own signal about where the technology now sits.
The security industry has long operated under a rough equilibrium. Finding and weaponising zero-day vulnerabilities required specialised human expertise, significant time, and an adversary willing to spend both. A skilled offensive researcher might need days or weeks to analyse a target, identify a novel vulnerability, develop a reliable exploit, and chain it into something meaningful. That constraint shaped the economics of the entire threat landscape and gave defenders a window between discovery and weaponisation.
Where Claude Opus 4.6 achieved near-zero success at autonomous exploit development, Mythos developed 181 working exploits in a specific Firefox engine benchmark alone — without intermediate human guidance after the initial task was set.
What Mythos Actually Did
- Identified a 17-year-old unauthenticated remote code execution vulnerability in FreeBSD's NFS server and autonomously constructed a working exploit involving a 20-gadget return-oriented programming chain
- Found a 27-year-old signed integer overflow in OpenBSD's TCP implementation enabling remote crash of any affected host
- Discovered multiple independent Linux kernel privilege escalation paths
- Constructed a four-vulnerability chain that escaped both the renderer sandbox and the operating system sandbox in a major browser
All of this without intermediate human guidance after the initial task was set.
November 2025 — Before Mythos
And then there is November 2025, which preceded Mythos entirely. Anthropic identified and disrupted a campaign attributed to suspected Chinese state-sponsored operators who had jailbroken Claude Code to automate a coordinated cyber espionage operation against approximately 30 global organisations spanning technology companies, financial institutions, chemical manufacturers, and government agencies.
Claude Code conducted 80 to 90 percent of the operation autonomously, handling reconnaissance, privilege escalation, lateral movement, credential theft, and data exfiltration at a request rate impossible to sustain with human operators. Four organisations were assessed to have been successfully breached.
And it happened with a model that did not yet have Mythos-level capabilities. That is the context this session was built around.
What the Risk Register Actually Says
The session mapped the security programme implications directly and did not soften them.
The 11 Priority Actions
The session gave a concrete eleven-step programme with specific timelines — not a strategy document.
For CISOs Specifically
The session closed with six direct actions for security leaders:
- Start using LLM-based vulnerability discovery now — it is already mature enough
- Update risk metrics — pre-AI assumptions about patch windows and incident frequency no longer hold
- Double down on segmentation, MFA, patching, IAM, and egress filtering — they still work and they raise attacker costs
- Treat every security role as an AI builder role — getting started is now easier than using Excel
- Run tabletop exercises for simultaneous high-severity events and pre-authorise containment actions
- Engage ISACs, CERTs, and sector groups — attackers operate as syndicates and defenders need collective defence structures to match
The frameworks exist: OWASP Top 10 for LLM Applications, MITRE ATLAS, NIST CSF 2.0, OWASP Top 10 for Agentic Apps 2026. The CSA paper this session drew from ties all of it together through MAESTRO, the AI Controls Matrix, and the STAR for AI programme.
Organisations that treat this as a future planning exercise are already behind.
Based on the session by Catalin Tiganila, CSA Luxembourg Chapter President, at BSides Luxembourg 2026, and the CSA research paper: The AI Vulnerability Storm: Building a Mythos-Ready Security Program, published April 14, 2026.