Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecurityBanking/Finance/InsuranceGovernment: Federal, State and Local

The Glasswing Warning: What Companies Outside the Inner Circle Must Do Now

By Rakesh Shah
Chess board
Felix Mittermeier via Unsplash
May 19, 2026

When Treasury Secretary Scott Bessent and Fed Chair Jerome Powell sit down with the CEOs of America’s largest banks to discuss systemic risk, it is rarely because of a software announcement. Project Glasswing changed that. Anthropic’s Claude Mythos Preview, a reasoning-first AI model that the company has deliberately chosen not to release due to the potential dangers it could cause, has autonomously discovered thousands of high-severity zero-day vulnerabilities across every major operating system and browser. The threat is considered so significant that only a small inner circle of vetted technology partners, including Apple, Amazon, and Microsoft, has been granted early access to begin patching.

The rest of the industry is on its own. And the clock is running.

As if the vulnerability landscape were not alarming enough, Anthropic is simultaneously engaged in a legal dispute over a Pentagon supply-chain risk designation tied to restrictions on government use of its AI models. This fight underscores how deeply AI has become entangled with national security infrastructure. For security leaders at organizations outside that inner circle, the implications are clear: you are not getting advance notice, and you cannot wait for someone else to define the response.

Why Mythos Is Different: Reasoning at Machine Speed

Every few years, a new class of threat tool forces the security industry to recalibrate. What’s noticeable is not just their sophistication, but it’s how they collapse traditional timelines and undermine long-standing security models.

Mythos is not simply a faster scanner. It represents a reasoning-first leap; an AI that does not just find vulnerabilities but chains them, prioritizes them for impact, and begins mapping lateral movement paths, all faster than any human red team can respond.

Gartner captured the inflection point precisely in its initial assessment: “The window between vulnerability discovery and active exploitation continues to collapse.” That sentence used to describe a weeks-long gap. In a Mythos-class environment, it describes minutes, and in some cases, the first exploit attempts beginning before defenders can even operationalize awareness. One vulnerability Mythos surfaced had been hiding in OpenBSD for nearly three decades. Another gave an unauthenticated attacker root on any exposed FreeBSD host. Mozilla has already patched 271 Firefox vulnerabilities that Mythos identified. And by Anthropic’s own account, 99 percent of what Mythos has found remains unpatched in the wild.

The compounding risk is what keeps security leaders up at night. And it should be keeping the entire tech industry up at night, too. Attackers with access to Mythos-class discovery tools — or even some similar derivative — can reverse-engineer a public patch within days, weaponize it, and begin exploitation before a typical enterprise has pushed the update to a meaningful portion of its estate. Your patch cycle was not designed for this.

Spotting Unauthorized AI Agents Before They Become Entry Points

One of the most unsettling disclosures around the Mythos rollout was the report that unauthorized users had briefly accessed the model through a third-party vendor environment. That detail matters beyond the alarming headline. It illustrates the risk that most organizations are not yet monitoring for: autonomous AI agents operating inside (or adjacent to) your infrastructure without explicit authorization.

The traditional perimeter model assumed that threats came from outside and that insiders were largely known quantities. AI agents violate both assumptions. They can be introduced through vendor integration, a compromised developer environment, or a misconfigured API connection. Once inside, they operate at a speed and scale that standard monitoring thresholds were never calibrated to detect.

Organizations need to begin auditing their environments for non-human identity exposure with the same rigor they apply to privileged human accounts. Service accounts are the fastest path in for an autonomous agent. A model probing for access will prioritize standing privileges, process memory, and token stores — exactly the kinds of assets that accumulate quietly in enterprise environments and rarely get reviewed. If you cannot answer the question of what a given service account does and whether it should still exist, you have a gap that Mythos-class models will find before your team does.

Immediate Steps to Strengthen Infrastructure Before These Models Go Wide

The identity layer is where Mythos-class attacks will ultimately land, and with good reason. The identity layer has become the primary attack surface regardless if it’s a human, non-human or agentic AI identity. Recent incident data shows that the majority of modern attacks bypass malicious binaries entirely, instead abusing trusted identity paths, misconfigurations, and standing privileges. Human users, service accounts, and increasingly autonomous AI agents all operate within the same identity fabric.

In this environment, identity is not simply “where attacks end.” It is where they start, propagate, and monetize. Whether the initial foothold comes from a misused API token, a compromised non-human account, or a cloud control-plane abstraction, the objective remains the same: Active Directory, Entra ID, domain controllers, and privileged access paths.

For organizations outside the Glasswing inner circle, here are five areas to focus on immediately.

  1. Shift from quarterly audits to continuous identity posture assessment. Quarterly reviews give attackers a 90-day window. Known misconfigurations like stale group policy objects, over-privileged service accounts, and risky conditional access gaps, become high-confidence exploit paths. Continuous monitoring at the identity control plane must run at the same cadence as endpoint vulnerability scanning.
  2. Inventory and retire your identity debt. Every environment carries legacy infrastructure that was never cleaned up: unsupported domain controllers, forgotten forest trusts, dormant privileged accounts, and hybrid sync configurations left over from old migrations. That debt will be fuel for AI-accelerated exploitation. Treat identity end-of-life with the same discipline you apply to device retirement. If it cannot be patched, it needs to be retired on a defined timeline.
  3. Move privileged authentication to phishing-resistant methods now. If Mythos-class tools make exploit generation cheap, the remaining control that holds is authentication that cannot be relayed, phished, or replayed. Hardware-backed MFA and passkeys for privileged accounts are not a future roadmap item. They are the control that separates a contained incident from a domain-level compromise.
  4. Design identity security across the full lifecycle, not just detection and response. Early ITDR initiatives focused heavily on alerting and investigation, which assumed a human-paced attacker. Mythos-class threats compress timelines to the point where detection alone is insufficient. Recognizing this, Gartner recently realigned ITDR to map across all six functions of the NIST Cybersecurity Framework 2.0: Identify, Protect, Detect, Respond, Recover, and Govern. Effective identity defense now requires the ability to freeze unauthorized changes to Tier 0 objects, block privilege escalation in flight, and disrupt lateral movement before it reaches a domain controller. When exploitation unfolds in minutes, every phase of that lifecycle matters.
  5. Test identity recovery before you need it. The default failure mode in a serious breach is an identity outage — Active Directory, Entra ID, or both. Restoring from backup is not recovery if the backup reintroduces the malicious changes that caused the incident. Organizations need tested object-level restore capability, malware-free forest rebuild procedures, and recovery time objectives that have been validated under pressure, not assumed. Yet most organizations are unprepared. According to the Quest Software State of ITDR 2026, more than 75 percent of organizations do not regularly test their identity recovery plans, leaving a critical blind spot that only surfaces during an active incident. With directory downtime estimated to cost hundreds of thousands of dollars per hour, discovering recovery gaps during a live attack is not an option.

The Modernization Trap

There is one more complication worth naming directly. The Mythos threat is arriving at exactly the wrong moment for most enterprises, which are in the middle of hybrid Active Directory-to-Entra ID migrations, zero trust rollouts, and cloud modernization sprints. Each of these initiatives creates precisely the conditions that AI-driven attackers will exploit: change windows that relax controls, temporary admin rights that linger, service accounts that spawn faster than they can be governed.

The answer is not to pause modernization. It is to apply the same identity security controls during change events that you use in steady state. Security posture cannot be suspended during migrations and re-enabled afterward. Controls must travel with the workload.

The Glasswing announcement is not a distant warning. For organizations outside the inner circle, the floodgates will open when these capabilities proliferate… and trust me, they will proliferate. The enterprises that survive the coming wave of AI-discovered zero-day exploitation will not be the ones with the fastest patch cycles. They will be the ones whose identity security infrastructure was already built to prevent, contain, and recover at machine speed. That window is narrowing. The time to build it is now.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security vulnerability vulnerability assessment vulnerability management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rakesh shah headshot

Rakesh Shah is the VP of Product Management & GTM Strategy for the Identity & Migration portfolios at Quest Software. Previously, he was the VP of product management for all products & services at LevelBlue, formerly known as AT&T Cybersecurity. He also led product management at AlienVault, prior to its acquisition for AT&T.

Rakesh also led product management for insider threat, behavioral analytics, and security orchestration products at Forcepoint, and he also spent over 15 years at Arbor Networks in a variety of roles in product management, marketing, and engineering leadership roles. He has an M.B.A. from the University of Michigan, Ann Arbor. Also, he holds an M.Eng. degree from Cornell University and a B.S. degree from University of Illinois at Urbana-Champaign, both in Electrical & Computer Engineering.

Image courtesy of Shah

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Security guard

Connected Security: How Proactive Real-Time Tech Keeps Security Workers Safe

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Gears on keyboard

    What the LockBit Data Breach Reveals About Its Inner Workings

    See More
  • cyber security

    What your API visibility and monitoring solution must do to fully protect you

    See More
  • Stethoscope by laptop

    The Change Healthcare breach: What changed, what didn’t, and what must

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • The Database Hacker's Handboo

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing