Anthropic’s Mythos has been framed as a major step forward in AI-driven vulnerability discovery. Whether every claim around the model holds up over time, the direction is clear: advanced AI is reducing the time and effort needed to find exploitable weaknesses in software. Anthropic outlined this in its Project Glasswing announcement and in its technical write-up, Assessing Claude Mythos Preview’s cybersecurity capabilities. For security leaders, that changes the conversation around external attack surface management.
External attack surface management, or EASM, is the practice of continuously discovering, monitoring and reducing risk across internet-facing assets. In simple terms, it helps organisations see what attackers can already see: domains, subdomains, web apps, exposed services, certificates, cloud assets, email infrastructure and misconfigurations.
Mythos is a signal about speed
The key takeaway from the Mythos story is speed. If AI can help defenders and attackers discover vulnerabilities faster, the time between exposure and exploitation gets shorter. That means security teams have less room for uncertainty around internet-facing assets.
A forgotten subdomain, an exposed admin portal, an old test environment or a stale DNS record has always been a problem. In an AI-accelerated environment, those issues become more valuable to an attacker because discovery and exploitation are getting cheaper.
EASM becomes more important
Most organisations already know they need patching, vulnerability management and secure software practices. The harder part is knowing exactly what is exposed to the internet today, who owns it and what changed this week.
That is where EASM plays a practical role. It helps teams:
- discover unknown or unmanaged internet-facing assets
- track changes across domains, cloud services and web applications
- spot misconfigurations and exposed services early
- give defenders the same outside-in view attackers use
- support faster remediation and clearer ownership
As AI improves exploit discovery, visibility becomes more valuable. Teams cannot protect what they have not identified.
Severity alone is no longer enough
One of the biggest operational shifts ahead is prioritisation. A long list of findings is difficult enough to manage today. If AI compresses the path from bug discovery to practical exploitation, security teams need to focus more on what is exposed, reachable and likely to be targeted first.
That pushes vulnerability management toward a more practical model:
- internet exposure
- asset criticality
- evidence of exploitation activity
- likelihood of exploitation
- ease of remediation
In other words, the question is moving from “how severe is this in theory?” to “how exposed is this in practice, and how quickly do we need to act?”
Secure by design still matters
Mythos does not reduce the need for secure-by-design software. Better software engineering, safer defaults, stronger vulnerability disclosure processes and quicker patching all remain essential.
But secure-by-design work happens upstream while EASM deals with the downstream reality that organisations run large, changing, internet-facing environments. Even well-managed teams accumulate drift over time: legacy systems, third-party services, expired certificates, shadow IT and infrastructure that outlives its original owners.
That is why secure-by-design and EASM belong together. One reduces the flow of new weaknesses. The other helps reduce exposure in the real world.
What security leaders should do now
For CIOs, CISOs and IT managers, the response to Mythos is not panic. It is preparation.
- Build and maintain a current inventory of internet-facing assets
- Continuously monitor for new exposures and unexpected changes
- Prioritise findings using exposure and exploitability, not severity alone
- Review legacy domains, subdomains and decommissioned services
- Strengthen patching and ownership workflows for public-facing systems
The organisations that adapt fastest will be the ones with the clearest external visibility and the shortest path from detection to action.
How Glasstrail fits
Glasstrail helps organisations understand their external attack surface from the outside in. That includes the assets, exposures and configuration risks that can be difficult to track across growing digital estates.
As AI changes the pace of vulnerability discovery, the business need stays simple: reduce blind spots, identify exposed assets quickly and act before an issue becomes an incident.
If you want to see what your organisation exposes to the internet today, start a free trial or book a demo.

