India ranks among the top 5 most cyberattacked nations globally, with over 1.3 million cybersecurity incidents recorded in 2023 alone. Anthropic's Mythos model — powerful enough to autonomously discover, triage, and exploit vulnerabilities — marks a qualitative shift in the AI-cybersecurity intersection, prompting both the Union government and CERT-In to study its implications.
"The real response is not 'find faster,' but protect faster and smarter." — Sharda Tickoo, Trend Micro
| Parameter | Pre-Mythos Era | Mythos-Class AI Era |
|---|---|---|
| Vulnerability discovery | Expert-driven, manual | Autonomous, scalable |
| Exploit development | Multi-step, specialist skill | Compressed lifecycle |
| Zero-day pricing | High exclusivity premium | Economics likely to drop |
| Bug bounty work | Human-led, expertise-heavy | Partial automation |
| Patch urgency | Reactive | Must become proactive |
Background and Context
Cybersecurity has long operated on an asymmetry: attackers need to find one gap; defenders must close all. AI amplifies this asymmetry. Mythos, under Anthropic's Project Glasswing, is being shared only with critical software firms — not released publicly — precisely because its autonomous vulnerability-finding capability could be weaponised at scale. A zero-day exploit is one unknown even to the software's own developers, making it unpatchable until discovered.
Key Concepts
The Vulnerability Lifecycle Discovering a vulnerability is only the first step. The full chain is: Discovery → Exploit development → Weaponisation → Deployment. Mythos compresses this entire lifecycle, reducing the time window available for defenders to respond.
N-day vs Zero-day
- Zero-day: Unknown to vendor; no patch exists
- N-day: Known vulnerability; patch exists but often undeployed
- Most real-world attacks today exploit N-day vulnerabilities — patching failure, not discovery failure, is the dominant problem
Agentic AI in Cybersecurity Unlike earlier models requiring human-defined steps, Mythos operates autonomously across multiple stages — triage, exploit development, prioritisation — reducing the expertise threshold for launching sophisticated attacks.
Implications and Challenges
| Dimension | Challenge |
|---|---|
| Offensive escalation | Bad actors will eventually access Mythos-class tools; zero-day market economics will shift |
| Defensive gap | Enterprises struggle with known vulnerability patching; AI-scale discovery will worsen the backlog |
| Workforce disruption | Lower-level repetitive security work will be commoditised; expertise bar will rise for contextualisation and validation |
| State-sponsored attacks | Shelf life of zero-days shrinks; sophisticated actors will chain vulnerabilities and target misconfigured environments |
| India-specific risk | Critical infrastructure, PSU IT systems, and UPI-linked financial networks face heightened exposure |
Opportunities: The Defensive Dividend
- AI-enabled vulnerability management can help prioritise the backlog of known vulnerabilities — the real bottleneck
- Bug bounty programmes become more efficient; discovery gets automated, freeing human researchers for higher-order contextualisation
- Human research remains essential for real-world exploitability assessment, business impact analysis, and attack path mapping
- Cybersecurity professionals who integrate AI into their workflow gain significant capability multipliers
- Small open-source models are already replicating some Mythos-class findings — democratising defensive tools alongside offensive ones
Governance and Policy Dimension
- India lacks a dedicated national AI-cybersecurity integration policy
- CERT-In's mandate and capacity need upgradation to account for AI-enabled threat actors
- Critical Information Infrastructure (CII) protection under IT Act 2000 must be reviewed for AI-era threat models
- The Digital Personal Data Protection Act 2023 creates data liability but does not address AI-assisted breach vectors
- International coordination needed: Mythos-class tools in state-sponsored hands (Pegasus-type actors) represent a strategic national security concern
Conclusion
Mythos is not a rupture — it is an acceleration. The cybersecurity challenge was never primarily about finding vulnerabilities; it was about closing them faster than adversaries could exploit them. AI shifts the speed and scale of both sides simultaneously. India's response must move beyond reactive patching toward proactive, AI-augmented vulnerability management, stronger CII governance, and a workforce strategy that prepares cybersecurity professionals for a world where discovery is automated but judgement remains irreplaceable.
