Key Takeaways
- Senior security executives have confirmed that cutting‑edge AI models from Anthropic (Mythos) and OpenAI can discover and exploit software vulnerabilities far faster than traditional methods.
- These AI tools are dual‑use: they enable developers to write more secure code, but the same capabilities also accelerate the creation of cyber weapons.
- Klarich of Palo Alto Networks predicts that comparable AI capabilities will become widely available in three to five months, spreading through Chinese models and open‑source repositories.
- The imminent flood of AI‑generated patches will increase the number of unpatched systems, raising supply‑chain risk, especially for open‑source software and infrequently updated IoT/industrial control devices.
- Attack timelines will shrink from days or hours to minutes, demanding fully automated patch deployment, virtual patching, and advanced defenses such as extended detection‑and‑response, zero‑trust architecture, and secure browsers.
- State and local governments must immediately rethink patch management, invest in automation, and adopt a holistic, AI‑driven security posture to survive the coming threat surge.
Introduction and Context
In a recent live webcast, Lee Klarich, chief product and technology officer at Palo Alto Networks, warned that states and localities have only months to brace for a new wave of cyber attacks powered by the latest generation of artificial‑intelligence models. Klarich’s team has been granted early access to Anthropic’s Mythos AI model through Project Glasswing and to OpenAI’s latest models via a Trusted Access for Cyber program. This privileged preview allows security vendors to evaluate how these frontier models perform both as defensive aids and as potential offensive weapons. The urgency of his message stems from the rapid pace at which AI capabilities are advancing and the limited time organizations have to adapt before those abilities become commonplace.
Testing Results and Capabilities of Mythos
Palo Alto’s hands‑on testing revealed that Mythos’ coding ability outperforms its predecessor by roughly 50 percent. This improvement is not merely academic; it translates directly into a markedly superior talent for spotting and exploiting software weaknesses. In a striking demonstration, Klarich reported that Mythos uncovered vulnerabilities that would have required several years of conventional penetration testing in just two weeks. The speed and depth of discovery illustrate how AI can compress the timeline of vulnerability research from months or years to days, fundamentally altering the economics of both attack and defense.
Implications for Cyber Offense and Defense
Klarich emphasized a critical paradox: teaching a model to write secure code inevitably teaches it to recognize insecure code. When an AI learns the patterns that produce robust software, it simultaneously learns the signatures of flaws that attackers seek. Consequently, the same models that help developers harden applications can be repurposed to generate exploits, craft malware, or automate the discovery of zero‑day vulnerabilities. This dual‑use nature means that defensive gains will be quickly matched—or even surpassed—by offensive capabilities unless organizations proactively harden their environments.
Projected Timeline for Widespread Availability
Although Anthropic and OpenAI have placed strict access controls on their newest models, Klarich anticipates that equivalent AI powers will diffuse broadly within the next three to five months. Historical patterns show that once a leading edge model demonstrates a capability, competing Chinese AI systems and open‑source projects typically catch up within that window. As these capabilities permeate community‑driven repositories and lower‑cost models, the barrier to entry for sophisticated cyber attacks will drop dramatically, making advanced exploit generation accessible to a far wider range of threat actors.
Impact on IT Security Landscape
The imminent proliferation of AI‑driven vulnerability discovery will place unprecedented pressure on IT security teams. Klarich warned that organizations will face a “deluge of vulnerabilities and patches” as vendors race to fix flaws before attackers can weaponize them. While rapid patching is beneficial, the sheer volume of updates will outstrip many agencies’ manual processes, leaving a growing segment of systems unpatched. Each unpatched system becomes a potential foothold for attackers, expanding the attack surface and increasing the likelihood of successful breaches.
Deluge of Vulnerabilities and Patches
Because AI can continuously scan codebases for weaknesses, software producers will issue patches at a frequency far exceeding current norms. Klarich noted that “lots, lots, lots more patches will be coming your way,” which creates a paradox: the more quickly vendors fix issues, the more opportunities arise for attackers to exploit the lag between patch release and deployment. For state and local governments, which often operate with limited staffing and legacy infrastructure, keeping pace with this torrent of updates will be a formidable challenge without substantial automation.
Supply Chain Risks and Open‑Source Exposure
Open‑source ecosystems are especially vulnerable to the new AI threat model. Attackers can leverage the transparency of source code to feed AI models massive repositories of libraries, frameworks, and utilities, scanning for exploitable flaws at scale. Klarich warned that malware could be delivered through seemingly legitimate software updates, compromising the trust that organizations place in their supply chains. Once a popular open‑source package is tainted, downstream consumers—including municipal IT systems—may inadvertently install malicious code, amplifying the impact of a single compromised component.
Speed of Attacks Automation
Beyond discovery, AI will streamline the entire attack lifecycle. Klarich predicted that with these models, the interval from initial vulnerability identification to exploit execution will shrink to minutes rather than days or hours. Automation will enable adversaries to chain together reconnaissance, weaponization, delivery, and execution with minimal human intervention, dramatically reducing the window for detection and response. For agencies that rely on periodic manual reviews or infrequent patch cycles, this acceleration renders traditional defenses insufficient.
Strategic Recommendations for States and Localities
To counter the impending surge, Klarich urged governments to rethink their patching processes from the ground up. He asserted that virtually every organization he speaks with lacks sufficient automation in patch deployment, a gap that must be closed urgently. Agencies should start by mapping their current patch workflow, identifying manual handoffs, and replacing them with automated pipelines that can test, approve, and apply updates in near‑real time. Embracing infrastructure‑as‑code and continuous integration/continuous deployment (CI/CD) practices will help ensure that security fixes keep pace with AI‑generated threats.
Virtual Patching and Emerging Technologies
Palo Alto is exploring virtual patching as a stopgap measure for environments where applying traditional patches is impractical—such as legacy industrial control systems, IoT devices, or heavily customized open‑source stacks. Virtual patching works by deploying protective rules (e.g., intrusion prevention signatures, web‑application firewall policies) that block exploit attempts without altering the underlying code. This approach can mitigate risk while agencies await formal patches, especially valuable when the volume of updates threatens to overwhelm manual processes.
Extended Detection and Response, Zero Trust, and Related Controls
Klarich stressed that automation alone will not suffice; organizations must layer advanced defensive capabilities. Extended detection and response (XDR) platforms correlate telemetry across endpoints, networks, and cloud services to spot subtle attack behaviors. Attack surface management tools continuously inventory and prioritize exposed assets. Secure browsers isolate web‑based threats, while enhanced identity controls—such as multi‑factor authentication and privileged‑access management—limit lateral movement. Finally, adopting a zero‑trust framework, which assumes breach and enforces strict verification for every request, provides a resilient foundation against AI‑accelerated intrusions.
Conclusion and Call to Action
The message from Palo Alto Networks’ senior leadership is clear: the era of AI‑powered cyber warfare is approaching faster than many anticipate. States and localities have a narrow window—measured in months—to transition from manual, reactive security postures to proactive, automated, and AI‑augmented defenses. By embracing rapid patch automation, virtual patching, XDR, zero‑trust principles, and a holistic view of the software supply chain, government entities can mitigate the imminent flood of vulnerabilities and protect critical services against the next generation of cyber threats. Failure to act now will leave them exposed to attacks that unfold in minutes, with potentially devastating consequences for public safety, essential infrastructure, and public trust.

