Caret-back
Back to Blog
Blog

Mythos Weaponized Every Vulnerability. Only Reachability Matters.

Alon Noy (Neuhaus), Co-Founder & CEO
3.5
min read
Apr 21, 2026
Mythos Weaponized Every Vulnerability. Only Reachability Matters.

Every satisfying assumption in vulnerability management just broke.

The assumption that most CVEs would never be exploited. The assumption that developing a working exploit required rare skill and significant time. The assumption that "no known exploit" meant "safe to deprioritize." The entire prioritization logic that let security teams sleep at night, built on the bottleneck of human effort between a vulnerability and a weapon. Attackers never cared about any of it. They only ever cared about what they could reach.

Anthropic's Claude Mythos removed that bottleneck. Autonomously. In a single prompt.

The exploitability myth

For twenty years, exploitability was the industry's favorite shortcut. CVSS told you the severity. EPSS told you the probability. CISA KEV told you what was actively exploited. All of it rested on a single, unspoken bet: that the distance between a vulnerability disclosure and a working exploit was long enough to give defenders a meaningful head start.

That bet paid off for a while. Exploit development was expensive, specialized, and slow. Most CVEs aged into irrelevance before anyone wrote a proof of concept, and the gamble rarely cost anyone.

AI changed the odds. Then Mythos broke the table.

The CSA/SANS "AI Vulnerability Storm" report, co-authored by former CISA Director Jen Easterly, Google's CISO Heather Adkins, former NSA Cybersecurity Director Rob Joyce, Bruce Schneier, and dozens of leading CISOs, frames it bluntly: the window between discovery and weaponization has collapsed into hours. The Zero Day Clock shows mean time-to-exploit falling from over two years in 2018 to under a single day in 2026. Mythos didn't start the trend, but it turned a slope into a cliff. And this capability isn't staying exclusive. Comparable offensive AI will reach open-weight models within a year.

The old playbook can't survive this

Your scanner still finds thousands of critical-severity CVEs. Your risk models still score them on CVSS and whether an exploit exists in the wild. Your patch cycle still runs in weeks.

But the attacker's cycle now runs in minutes. AI generates its own exploits, chains vulnerabilities together, and finds attack paths that human researchers haven't mapped. Every CVE in your backlog just became a loaded weapon.

Patching harder won't close this gap. Scanning more won't close it either. Prioritizing by exploitability, when everything is now exploitable, is like sorting deck chairs by color.

The only question that still matters

If exploitability no longer separates signal from noise, what does?

Reachability. Not whether a vulnerability is severe, or whether an exploit exists, but whether an attacker can actually reach and exploit it in your specific environment. Your actual network topology, configurations, and controls. Your real attack surface, not a theoretical one.

This is why we founded Astelia. Years of leading red team operations taught us that attackers don't think in vulnerability lists. They think in paths. Which assets can I reach? How do I get from the outside to something valuable? The vulnerability is just the last step. Everything before it, the network path, the segmentation, the configurations that allow or block lateral movement, is what determines whether an attack actually works. We watched defenders spend enormous effort remediating findings that no attacker could ever reach in their environment, while real exposures sat untouched in the backlog.

We built Astelia to give defenders that attacker's perspective. We map your actual network topology through read-only integrations to your existing stack, then use agentic AI to cross-correlate each vulnerability's technical requirements with your real network and runtime data. If a vulnerability isn't reachable, we set it aside. If it is, we surface it with the full attack path and evidence of why it matters. Our customers consistently report the same finding: less than 2% of vulnerabilities in their environments turn out to be actually reachable. The rest are real vulnerabilities, but not real exposures.

Reachability was always the right question. Mythos just made it the only one.

Radical focus or radical burnout

The CSA/SANS report warns that security teams are absorbing exponential increases in workload without corresponding increases in headcount or tooling. Burnout is now a direct operational risk. The report recommends hardening environments, accelerating patch cycles, deploying AI agents defensively. All good advice. But it all requires knowing where to focus.

Without reachability, you end up treating every critical CVE as equally urgent, burning out your team on vulnerabilities that couldn't be exploited in your environment even if an attacker tried. With Astelia's reachability analysis, the scope collapses to the less than 2% that represent real exposure. For each of those, Astelia shows the full attack path and offers multiple ways to close it. This matters more than ever when AI creates exploits faster than vendors ship patches. Astelia doesn't assume a patch exists. It surfaces configuration changes, segmentation options, and compensating controls that break the attack chain now, without waiting for a fix that may be weeks away. Teams go from drowning in thousands of critical findings to working a focused list they can actually close.

This is the first wave

Mythos is the first of many AI-driven disruptions to cybersecurity. The organizations that survive won't be the ones that try to patch everything or scan harder. They'll be the ones that know, with proof, which vulnerabilities an attacker can actually reach.

Astelia was built for exactly this. Not to add another score to the pile, but to replace exploitability buffers and assumptions with evidence. What's actually reachable in your environment, and the fastest way to close it.

Alon Noy (Neuhaus), Co-Founder & CEO

Alon Noy is the Co-Founder and CEO of Astelia, bringing extensive cybersecurity expertise and leadership experience. He served in Unit 8200 as part of a nation-state actor and later led the Israeli National Cybersecurity Red Team. Alon has managed large R&D organizations and was honored with the Minister of Defense Excellence Prize and twice as part of teams that won the Israel Defense Prize. A Talpiot graduate, he holds an M.Sc. in Computer Sciences from Tel Aviv University.

Share