Anthropic’s Glasswing signals a shorter cyber risk cycle for financial services

  • Ridha Mesli, Chinmoy Bhatiya, Shane Molinari, Michael Groberman, Faizan Shaikh
  • 04 May 2026

Predicting impending threats to “economies, public safety and national security” and promising to “reshape cybersecurity”, Anthropic’s early April announcement of Project Glasswing and Claude Mythos Preview – its latest general-purpose frontier AI model – prompted both concern and excitement.

A restricted cybersecurity initiative built around Claude Mythos Preview, Project Glasswing provides a small group of partners–including AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks–with controlled access to the model. The goal is to identify and remediate critical software vulnerabilities before comparable capabilities become more widely available across the ecosystem.1 

The initiative is both a resilience signal for financial institutions and a significant product launch. Anthropic reports that Claude Mythos Preview identified and exploited zero-day vulnerabilities-previously unknown and unpatched software flaws-including some affecting major operating system and web browsers during internal testing.1 Access to the model has been restricted through Project Glasswing, allowing partners to secure critical software ahead of broader exposure.2

Whether or not institutions accept Anthropic’s reported benchmarks at face value, the strategic implication is clear: if models like Claude Mythos Preview significantly reduce the time between vulnerability discovery and weaponization, existing cyber resilience assumptions may no longer hold.1

For financial services, this initiative arrives as AI risk is already receiving more sector-specific attention from the US Treasury, NIST, and the Financial Stability Board.3,4,5,6,7 The issue is no longer just whether AI can improve defense. It is whether resilience, governance, and operating models can keep pace as threat activity accelerates.

 

The significance of Glasswing’s roll-out

Anthropic’s decision to restrict access to Claude Mythos Preview through the Glasswing initiative, rather than release it more broadly, has been closely watched across the cybersecurity and technology sectors. The company argued the model’s cyber capabilities are too dangerous for a broader release, particularly given that over 99% of the vulnerabilities it identified remained unpatched and undisclosed.8

In its announcement, Anthropic said it was extending Glasswing access to a group of over 40 additional organizations that build or maintain critical software infrastructure so they can use the model to scan and secure both first-party and open-source systems.1 It also committed $100 million in usage credits for Mythos Preview across these efforts, as well as $4M in direct donations to open-source security organizations. 

Within a week, OpenAI announced it was scaling up it Trusted Access for Cyber (TAC) program “to thousands of verified individual defenders and hundreds of teams responsible for defending critical software” and fine-tuning its models to enable defensive cybersecurity use cases, starting with GPT 5.4 Cyber, a variant of GPT 5.4 “trained to be cyber-permissive”.9

As OpenAI notes in an April 14 post: “Existing [AI] models can help find vulnerabilities, reason across codebases, and support meaningful parts of the cyber workflow, and threat actors are experimenting with novel AI-driven approaches. We’ve seen sophisticated harnesses elicit stronger and stronger capabilities by using more test-time compute with existing models. That means safeguards cannot wait for a single future threshold.”

The strategic point for financial institutions is that a temporary advantage for defenders has been created, but it is expected to narrow as similar capabilities become more widely available. Mythos-class capabilities will only become more widespread. Firms that use this window to accelerate resilience programs are aligning with the model Anthropic, Treasury, and cohort partners are signaling. Firms that treat this as another vendor announcement lose the window.

 

What the technical signal suggests

These reported indicators are worth closer attention:

  • Anthropic says Mythos identified thousands of previously unknown vulnerabilities, including zero-days across major operating systems and browsers, and some defects that had remained hidden for decades.2
  • According to Anthropic’s Frontier Red Team technical assessment, 72.4% of those vulnerabilities could be turned into working exploits, versus near-zero rates for prior AI models.2
  • The reported time from disclosed vulnerability to working exploit fell to less than one day at a cost of under $2,000.2
  • Anthropic has not released Mythos publicly, but the working assumption in the technical discussion is that comparable capability will not remain scarce indefinitely.
  • JPMorganChase’s participation as a core Glasswing partner highlights that financial institutions are already tracking the issue closely. 

These points should be treated as company-reported and technically directional, not as independent market-wide validation. Even so, the operational implication is straightforward in that if exploit development timelines compress materially, then patching, validation, escalation, and compensating controls all come under more pressure.

 

Why this matters now

If frontier models compress the path from vulnerability discovery to exploit development, then long validation cycles, broad patch backlogs, and slow governance processes become more exposed. In that environment, resilience is tested not only by control strength, but by control speed. That is the shift financial leaders should focus on now.

Patch faster. Patch velocity matters more when the threat cycle accelerates. Financial institutions should test whether patch governance, exception handling, and compensating controls can move fast enough for critical assets, internet-facing systems, privileged access paths, and services that support core transactions. This is not about treating every vulnerability the same way. It is about making sure the remediation path for critical exposures is faster, more targeted, and less burdened by routine process friction.

Focus on what is exploitable. Severity alone is not enough in a faster threat environment. What matters most is whether a vulnerability is reachable, exposed, weaponizable, and connected to critical business services. The goal is not simply to reduce the backlog. It is to identify which vulnerabilities create the most credible path to service disruption, fraud, data loss, or operational compromise, and to move on those first. In a compressed threat cycle, exploitability must drive action.

Reaction time is now a control. When remediation cannot happen immediately, institutions need to move quickly on compensating actions such as network isolation, access restrictions, enhanced monitoring, vendor escalation, and executive risk decisions. Slow escalation paths and unclear ownership become resilience weaknesses when timelines compress. Reaction time is no longer just an operational metric. It is part of the control environment.

 

What to do about it

Financial institutions do not need more theory –they need resilience programs that can operate at the speed this environment demands.

  • Move from periodic testing to continuous adversary simulation. Annual penetration tests and periodic reviews are not built for an environment where exploit timelines may collapse into hours or days.
  • Compress patch and exception cycles for critical exposures. Critical internet-facing assets, privileged access paths, and systems that support payments, customer servicing, trading, or core operations should move through faster remediation and clearer exception thresholds.
  • Prioritize exploitability, not backlog volume. Vulnerability programs should focus on reachability, exposure, business criticality, and attack-path relevance rather than raw ticket counts.
  • Strengthen third-party and shared dependency monitoring. If AI-assisted vulnerability discovery accelerates, vendor and software supply chain weaknesses become more dangerous. External attack surface monitoring, supplier escalation, and dependency mapping should be treated as part of resilience. This reinforces that capability-restriction boundaries depend on the broader ecosystem [8], including third-party environments and coordinated controls.
  • Use AI defensively but govern it tightly. Defensive AI can strengthen code review, configuration analysis, and anomaly detection, but it should be governed as part of the control environment, with clear oversight for access, data handling, dependency risk, and model-driven workflows.
  • Elevate the issue beyond security engineering. This is also a resilience and governance issue for technology, risk, operations, and executive leadership because the control environment may need to adapt as quickly as the threat environment. 

Anthropic’s Glasswing announcement [1] should not be viewed as a reason for alarm – but it should be read as an early warning. For financial services firms, the immediate priorities are clear: accelerate patching on critical assets, prioritize what is actually exploitable, reduce the time it takes to escalate and act, and tighten governance around new AI-enabled dependencies. In a faster AI-enabled threat environment, reaction time becomes a control in its own right.

 

How Capco helps you move faster

Build patching programs for a faster threat cycle – We help our clients redesign cyber resilience and vulnerability management programs, so critical exposures move through faster decision and remediation paths. That includes tightening patch governance, reducing exception drag, aligning security and infrastructure teams around critical asset remediation, and strengthening compensating controls when immediate patching is not feasible.

Prioritize what is actually exploitable – Capco helps our clients move from broad vulnerability backlogs to exploitability-based prioritization. That means focusing on the exposures most likely to create service disruption, data compromise, fraud risk, or control failure in the client’s actual environment, and linking remediation decisions more directly to business criticality, attack paths, and operational dependency.

Reduce reaction time across the control environment – We help clients reduce decision latency across cyber, technology, risk, and operations. That includes clarifying escalation paths, defining trigger-based response actions, improving coordination across stakeholders, and strengthening response playbooks for high-velocity vulnerability and threat scenarios.

Move to AI-enabled cyber operations – AI capabilities need to become part of the cyber control environment, not just a source of new risk. Capco helps clients evaluate the cyber and resilience implications of adopting AI services and AI enabled security tools, then embed those capabilities across enterprise cybersecurity programs in a governed, scalable way.

 

References
1 https://red.anthropic.com/2026/mythos-preview/
2 https://www.anthropic.com/project/glasswing
3 https://home.treasury.gov/news/press-releases/sb0395
4 https://home.treasury.gov/news/press-releases/sb0401
5 https://home.treasury.gov/news/press-releases/sb0421
6 https://csrc.nist.gov/News/2025/nist-releases-prelim-draft-cyber-ai-profile
7 https://www.fsb.org/2025/10/monitoring-adoption-of-artificial-intelligence-and-related-vulnerabilities-in-the-financial-sector/
8 https://www.anthropic.com/glasswing
9 https://openai.com/index/scaling-trusted-access-for-cyber-defense/

 

Get in touch

To find out more about working with Capco and how we can help you overcome any potential challenges, contact our experts or subscribe for the latest insights below.

Be the first to know

Receive email updates on the latest Capco insights.