AI-Driven Attacks Deepen Global Cybersecurity Gap

Reporting from Rest of World, The New York Times, Reuters and industry outlets describes a rapid rise in AI-enabled cyberattacks and a widening defensive divide. Multiple outlets report that advanced models such as Anthropic's Mythos or Mythos Preview have been reported to identify thousands of previously unknown vulnerabilities across major operating systems and browsers, and that Anthropic limited wider access by forming a coalition of about 40 firms, described in reporting as "Project Glasswing" (The New York Times). Treasury Secretary Scott Bessent and Federal Reserve Chair Jerome Powell convened bank executives to discuss the risks, according to The New York Times and Bloomberg/PYMNTS reporting. Industry and central-bank analyses cited by BIS and Reuters frame the development as a dual-use threat that both aides defenders and accelerates attackers.
What happened
Reporting by Rest of World, The New York Times, Reuters and other outlets describes a sharp increase in cyber risk driven by generative AI models. Rest of World and Reuters report that advanced models, referenced in coverage as Mythos or Mythos Preview, have been reported to identify thousands of previously unknown, high-severity vulnerabilities across major operating systems and web browsers. Reporting by The New York Times states that Anthropic restricted broader access to the model and limited use to a coalition of roughly 40 companies, described in reporting as "Project Glasswing." The New York Times and Bloomberg/PYMNTS report that Treasury Secretary Scott Bessent and Federal Reserve Chair Jerome H. Powell convened senior bank executives to warn about potential cyber risks associated with such tools.
Technical details
Reporting across outlets documents two technical dynamics. First, generative models are being used to accelerate vulnerability discovery and exploit generation; multiple outlets report that Mythos demonstrated rapid identification of high-severity flaws. Second, coverage from the Bank for International Settlements (BIS) and security vendors cited by Reuters describe that the same model classes can be used defensively for automated code-auditing, patch prioritization, and intrusion detection. The balance between offensive and defensive capabilities is therefore described in reporting as a classic dual-use problem that shortens the time between vulnerability discovery and active exploitation.
Industry context
Editorial analysis: Industry reporting frames restricted access to high-capability defensive models as concentrating advanced defensive capacity among well-resourced firms and partner institutions, while leaving many smaller organisations, central banks, and lower-income nations with less access to the same tooling. Observed patterns in comparable technology diffusion show that when defensive capability is unevenly distributed, attackers exploiting gaps in one region or sector can produce cascading risks elsewhere because of interconnected systems and supply chains.
Operational implications for practitioners
Editorial analysis: For security teams and infrastructure owners, the reports underscore an increased premium on rapid detection, patching, and threat hunting. Industry reporting highlights that automated discovery reduces defenders' patching window; practitioners will therefore watch maturity of model-assisted triage, exploit-proofing workflows, and the integration of automated findings into established change-control processes. Reporting also points to a talent shortage in cybersecurity that compounds the gap between capability and demand.
Regulatory and policy significance
Editorial analysis: Coverage of the convening of U.S. banking and Treasury officials, as reported by The New York Times and Bloomberg/PYMNTS, illustrates regulator-level concern about AI-driven cyber risk. BIS reporting, as referenced in media snippets, notes that central banks see both improved detection capacity and new social-engineering and exploit risks from generative systems. Observed patterns in prior dual-use technology debates suggest regulators will face trade-offs between enabling defensive uses and limiting proliferation of offensive capabilities.
What to watch
Editorial analysis: Observers should track three indicators in coming months:
- •which vendors or coalitions widen access to high-capability defensive models and under what governance terms
- •whether security vendors publish benchmarks showing reductions in time-to-detect or patch for AI-assisted tooling
- •regulatory guidance or disclosure expectations from central banks and financial regulators following the meetings reported by The New York Times and Bloomberg. Reporting to date gives limited public detail beyond the coalition description, and outlets note debate over safe-release practices
Bottom line
Reporting converges on a practical tension: the same generative capabilities that can speed up defense also accelerate attackers. The immediate operational effect, according to industry and central-bank reporting, is a widening gap in defensive coverage between resource-rich institutions and those with limited access to advanced tooling.
Scoring Rationale
The story affects core operational security for many organisations and involves central banks and major regulators, making it highly relevant to practitioners. The dual-use nature of powerful models creates systemic risk and governance trade-offs that are likely to shape tooling and policy.
Practice with real Banking data
90 SQL & Python problems · 15 industry datasets
250 free problems · No credit card
See all Banking problems

