CFOtech UK - Technology news for CFOs & financial decision-makers
United Kingdom
The Mythos moment: Why 'unknown exposure' is becoming the biggest cyber risk of 2026

The Mythos moment: Why 'unknown exposure' is becoming the biggest cyber risk of 2026

Fri, 22nd May 2026 (Today)
Katrina Thompson
KATRINA THOMPSON Writer Bora

Frontier AI models are upending what we thought we knew about vulnerability management and forcing security strategists to think bigger, faster, and in shorter cycles. 

These models – led by Anthropic's Mythos, at the moment – have not only speed up the pace at which vulnerabilities are found, but all exposures across the entire attack surface, generally. While this certainly is the "moment" for Mythos, this capability (of finding flaws instantaneously) is here to stay and must be factored into every security consideration from now on. 

What we're seeing is the start of what cybersecurity is going to look like going forward: attackers operating at unmatched speed to find any weakness that's been living on any system for any amount of time (even 27 years, as famously cited by Project Glasswing). Cybersecurity has now become LLM cybersecurity.

And that will never change, even when quantum cracking capabilities force us to factor in another vector (we're halfway there). 

On the upside, it erases the "unknown unknowns," a perennial boogey man keeping CISOs up at night. On the downside, it erases the unknown unknowns, forcing defenders to deal with all exposures at once.

Before the advent of exposure management, this was an insurmountable issue. Now, AI-enabled exposure assessment platforms (EAPs) present the way – and probably the only way – for organizations to combat frontier models at machine speed. 

The age of frontier AI threats

Today it's Mythos, but ChatGPT 5.5 is already being hailed for its similar vulnerability-finding capabilities, and OpenAI's Daybreak released just a month on its heels: it promises to be a serious contender.

Each on their own changes cybersecurity for the permanent. Together, they have launched us squarely into the era of AI security and have forced strategic resets on the part of defenders. 

AI-powered attackers can now find and exploit vulnerabilities in minutes, and with unmatched accuracy: in two months, Mythos discovered 271 flaws in Firefox, with no false positives. This has prodded discussions about the broader "AI vulnpocalypse" and has established that "zero-days are numbered." Unfortunately, for both sides.

In the wake of these capabilities, what happens to the 90-day patch window? Demolished. Completely untenable. Defenders are going to have to pivot to instantaneous response, but more than that, to predictive protection.

Before these models emerged, the ability to predict exploitability was called proactive defense, as defenders were going "above and beyond" to find weaknesses that weren't being actively exploited (and were likely not even known yet to attackers). With all hidden vulnerabilities suddenly coming to light, this type of defense is now essential. What was once the high standard has become the bar. 

Evolving from CVSS to Mythos-ready tooling

As noted in Mozilla's blog, Distilled, "Until now, the industry has fought security to a draw," lacking the ability to find enough, fast enough. Now "the defects are finite, and we are entering a world where we can finally find them all."

But that very ability can create problems when exercised by unmitigated AI. In the wake of Mythos-aided discovery, detection tools are likely to report that 60% of all vulnerabilities found are critical. This doesn't narrow the gap enough for teams to effectively predict which one is the next target, especially when compounded with part-human, part-automation workflowsand understaffed SOCs. 

Now that attackers are playing with the same open playbook, finding vulnerabilities isn't enough: pinpoint prioritization has become a necessity. That's because attackers aren't looking for single CVEs, but attack paths. And it's vital to understand which must be remediated first.

A Mythos-ready program cross-references AI-discovered flawswith business criticality and "toxic combinations", narrowing the scope down to the 1.6% that actually present a viable route to your crown jewels. Exposure assessment platforms determinethese attack paths and close them autonomously: AI agents automate triage and response, enabling teams to patch weaknesses at the same rate (and with all luck, faster) than evolving AI models can find them. 

Autonomous EAP vigilance also combats the collapsed time-to-exploit window, which AI effectively shrinks from 5 days to only a few minutes. EAPs regularly challenge the environment against the MITRE ATT&CK framework, exposing it to a continuous loop of automated red teaming so defender detection is as consistent and fast as AI-powered findings: Gartner refers to this as adversarial exposure validation (AEV). 

The biggest risk in 2026 and beyond

Frontier AI models are presenting both new opportunities andfresh concerns for the cybersecurity industry. Unknown unknowns may be out, but the premium now and going forward will be prioritizing the most important ones and getting there first.

Which is why in the era of AI, security is primarily about speed - visibility is no longer an issue- but speed of adoption as much as speed of detection. 

Going forward, the race won't be about who can create the best capabilities; compromised AI models ensure they're out there for everyone. It will be won by those who can adopt the available technologies fast enough and master them in time enough to matter within their own environments.