Anthropic's Mythos is an inflection point, the rules of cybersecurity will have to be rewritten
The life of a cybersecurity executive has been upended by the arrival of a new class of artificial intelligence systems that can sift through vast swathes of software and surface weaknesses at a speed no human team can match. Sharda Tickoo, country manager for India & SAARC at TrendAI (formerly Trend Micro), says she has spent the past fortnight incessantly talking to clients, partners and stakeholders — fielding alarm, explaining context, and mapping out a path forward. "It is now established that AI has crossed a threshold where it can discover vulnerabilities at a level comparable with top human researchers, but at a speed and scale humans simply cannot match," she says. "The same capability can defend or be weaponised."
The catalyst for this collective anxiety is Mythos, a frontier AI model developed by Anthropic that has demonstrated a remarkable — and deeply unsettling — ability to surface zero-day vulnerabilities across major operating systems and web browsers. Its emergence has prompted crisis talks among regulators worldwide, and inside the industry, it has accelerated a reckoning that many say was long overdue.
Diwakar Dayal, MD and area VP for India & SAARC at SentinelOne, has lived through every major technology wave of the past three decades — the birth of the internet, the cloud era, the mobile revolution. He is unequivocal that this one is different. "Every previous wave took years to unfold. This one is almost on steroids," he says. "Unless you respond to AI-driven attacks with AI-driven defence, it is an impossible battle." For Dayal, the starkest illustration of the shift is the shrinking gap between vulnerability discovery and exploitation. "Fifteen years back, the gap was maybe two years. Then it became months. Now it is hours," he says. "You cannot patch everything. That game is already lost."
That compression has rendered traditional security practices inadequate at a structural level. For years, the industry's backbone was the patch cycle — find the flaw, fix the flaw. But as Tickoo notes, the backlog of unpatched vulnerabilities was already enormous before Mythos arrived. "Enterprises are still struggling to patch n-minus-ten vulnerabilities (security flaws present in software versions that are ten releases behind the current, most up-to-date version)," she says. "Mythos has not created new vulnerabilities so much as revealed what was already there. It simply compresses the timeline of exploitation."
AI native defence
The industry's response is coalescing around a single principle: security must become AI-native, not merely AI-assisted. Tickoo is emphatic on the distinction. "Traditional tools were built for human-led detection. That model does not hold when AI can uncover thousands of vulnerabilities across systems," she says. At TrendAI, that means integrating Claude models directly into its platform to drive what she calls "agentic autonomous security operations" — systems that learn continuously, prioritise intelligently, and act without waiting for human instruction. The company's Zero Day Initiative programme, long a researcher-driven effort to surface vulnerabilities, is itself being made more automatic and agentic. Dayal echoes this at SentinelOne, where the company's endpoint security platform operates in real time, detecting and containing threats at machine speed irrespective of whether a patch exists. "If you use traditional methods," he says simply, "it is not possible."
For the time being practices like virtual patching — placing a protective wrapper around a known vulnerability to block exploitation without requiring a restart or downtime — have become a critical stopgap in this environment. Tickoo explains that while it has always existed, it is now becoming non-negotiable. "You will not be able to patch everything because it requires downtime," she says. "Virtual patching acts as a compensating control. Technically, the vulnerability is still there inside the asset, but the moment anyone tries to exploit it, it will be blocked."
Satykam Acharya, co-founder and director of offensive practices at Infopercept, argues that the real challenge is not simply discovery but prioritisation. "Most breaches are not caused by complex zero-days," he says. "They come from misconfigurations, weak identity controls, or exposed credentials. In many cases, attackers are no longer hacking in — they are simply logging in." His firm's approach focuses on helping clients answer three questions: which vulnerabilities are actually exploitable, which create real business risk, and what to fix first.
Philippa Cogswell, managing partner for JAPAC at Palo Alto Networks Unit 42, describes the present moment as a "definitive inflection point", noting that Palo Alto’s own tests with Mythos showed how the AI system completed a year's worth of penetration testing in under three weeks. "Defending against an attacker who can do in minutes what a team does in weeks requires a completely different approach,” she says. “This is why we are seeing a move towards platformisation, where security data is consolidated so AI can detect, prioritise and respond to threats in real time.”
Balaji Rao, Area VP for India & SAARC at Commvault, says detection and prevention remain essential, but they are no longer enough when attack chains can move at machine speed. He says that Commvault, which specialises in data protection and cyber recovery for enterprises, has adopted a "ResOps" approach, where recovery systems are continuously validated rather than periodically reviewed.
Sunil Gupta, co-founder and CEO of QNu Labs, takes the most unsparing view: "Mythos is not a warning. It is a verdict on the past decade of cybersecurity complacency." He advocates for quantum-safe architectures as the only route beyond what he calls "a continuous, expensive, losing cycle" of patching.
Job opportunities galore
For all the turbulence, there is one note of striking optimism: this is, by most accounts, an extraordinary moment to build a career in cybersecurity. "If anyone is looking for a career, the future is in cyber," says Dayal. "This industry can absorb a lot more people." But the bar has risen sharply. The next generation of professionals will need fluency not just in networks and systems, but in AI infrastructure, model security, prompt injection attacks, and the architecture of agentic systems. "We don't need people with basic knowledge anymore," Dayal says. "We need people who can understand complexity at a much deeper level." Tickoo agrees: "It will become more specialised — and there will be a reskilling from a cybersecurity standpoint."
Diwakar Dayal, MD and area VP for India & SAARC at SentinelOne, has lived through every major technology wave of the past three decades — the birth of the internet, the cloud era, the mobile revolution. He is unequivocal that this one is different. "Every previous wave took years to unfold. This one is almost on steroids," he says. "Unless you respond to AI-driven attacks with AI-driven defence, it is an impossible battle." For Dayal, the starkest illustration of the shift is the shrinking gap between vulnerability discovery and exploitation. "Fifteen years back, the gap was maybe two years. Then it became months. Now it is hours," he says. "You cannot patch everything. That game is already lost."
That compression has rendered traditional security practices inadequate at a structural level. For years, the industry's backbone was the patch cycle — find the flaw, fix the flaw. But as Tickoo notes, the backlog of unpatched vulnerabilities was already enormous before Mythos arrived. "Enterprises are still struggling to patch n-minus-ten vulnerabilities (security flaws present in software versions that are ten releases behind the current, most up-to-date version)," she says. "Mythos has not created new vulnerabilities so much as revealed what was already there. It simply compresses the timeline of exploitation."
AI native defence
For the time being practices like virtual patching — placing a protective wrapper around a known vulnerability to block exploitation without requiring a restart or downtime — have become a critical stopgap in this environment. Tickoo explains that while it has always existed, it is now becoming non-negotiable. "You will not be able to patch everything because it requires downtime," she says. "Virtual patching acts as a compensating control. Technically, the vulnerability is still there inside the asset, but the moment anyone tries to exploit it, it will be blocked."
Satykam Acharya, co-founder and director of offensive practices at Infopercept, argues that the real challenge is not simply discovery but prioritisation. "Most breaches are not caused by complex zero-days," he says. "They come from misconfigurations, weak identity controls, or exposed credentials. In many cases, attackers are no longer hacking in — they are simply logging in." His firm's approach focuses on helping clients answer three questions: which vulnerabilities are actually exploitable, which create real business risk, and what to fix first.
Balaji Rao, Area VP for India & SAARC at Commvault, says detection and prevention remain essential, but they are no longer enough when attack chains can move at machine speed. He says that Commvault, which specialises in data protection and cyber recovery for enterprises, has adopted a "ResOps" approach, where recovery systems are continuously validated rather than periodically reviewed.
Sunil Gupta, co-founder and CEO of QNu Labs, takes the most unsparing view: "Mythos is not a warning. It is a verdict on the past decade of cybersecurity complacency." He advocates for quantum-safe architectures as the only route beyond what he calls "a continuous, expensive, losing cycle" of patching.
Job opportunities galore
For all the turbulence, there is one note of striking optimism: this is, by most accounts, an extraordinary moment to build a career in cybersecurity. "If anyone is looking for a career, the future is in cyber," says Dayal. "This industry can absorb a lot more people." But the bar has risen sharply. The next generation of professionals will need fluency not just in networks and systems, but in AI infrastructure, model security, prompt injection attacks, and the architecture of agentic systems. "We don't need people with basic knowledge anymore," Dayal says. "We need people who can understand complexity at a much deeper level." Tickoo agrees: "It will become more specialised — and there will be a reskilling from a cybersecurity standpoint."
Popular from Technology
- After $6.25 billion 'gift' to Trump Accounts, Michael and Susan Dell donate $750 million to the University of ...
- Mark Zuckerberg's Meta to all employees in America: We are installing tracking software in your machines as we need your help to ...
- Google CEO Sundar Pichai says AI generates 75% codes at the company: Why this number matters
- Nobel Prize-winning economist on Anthropic CEO's white-collar jobs wipeout: He may be underestimating how messy some of those jobs are
- Quote of the day by Google CEO Sundar Pichai: “I have a secret project that adds four hours every day to the 24 hours we have. There’s a bit of time travel involved.”
end of article
Trending Stories
- West Bengal Election Voting 2026 Live Updates: Final campaign blitz ends in fierce TMC vs BJP showdown
- Karnataka SSLC result 2026 released at karresults.nic.in: Direct link to check Class 10 marks memo here
- Karnataka Board SSLC 10th Result 2026: Scores shortly on karresults.nic.in as over 8.65 lakh students await marks memo; here’s how to check
- Tamil Nadu Election 2026 Live Updates: TVK chief Vijay urges EC to extend polling by 2 hours; clash reported between AIADMK and DMK cadres in Salem
- Israeli drone dropped grenade on rescuers aiding wounded journalist, says Lebanon
- UP Board 12th Result 2026 Live Updates: UPMSP Inter results releasing tomorrow at 4 PM; check official websites, steps to download scores on TOI portal
- UP Board 10th Result 2026 Live Updates: UPMSP Class 10 scorecards releasing on April 23, official notice issued, here's how you can download scorecards from website, DigiLocker and other apps
Featured in technology
- Quote of the day by Google CEO Sundar Pichai: “I have a secret project that adds four hours every day to the 24 hours we have. There’s a bit of time travel involved.”
- Blox Fruits codes for April 2026
- South Korea fines matchmaking firm Duo $815,000 over data breach affecting 420,000 users
- Apple iOS 26.4.2 addresses iPhone Settings flaw that FBI reportedly used to extract deleted Signal messages
- After months of launching 'almost full-scale raid' on OpenAI ex-CTO Mira Murati’s Thinking Labs, Mark Zuckerberg's Meta poaches yet other staff from $12 billion startup
- Hack of the day: Swap passwords for passkeys where possible
Photostories
- 5 things children remember about their parents long after they grow up
- Why does homemade curd release transparent liquid on top? 4 tips to fix it and set perfect curd at home
- 5 emerging Mumbai locations offering affordable sea-view apartments for homebuyers
- How to get rid of cockroaches naturally: 10 Proven home remedies that work fast
- Delhi IRS officer's daughter's rape-murder: How accused exploited knowledge of family routine to strike
- Stomach pain or acidity? Signs your “GERD” could be something more serious, and what to do next
- World Book Day 2026: 10 quotes by famous people on the joy of reading
- 10 cute baby girl pet names that begin with letter A
- 5 of the most beautiful fish in the world that don’t look real
- Coachella 2026: 5 bizarre influencer outfits that ruined the festival fashion
Up Next
Start a Conversation
Post comment