Back to News
Market Impact: 0.6

Anthropic is giving companies, including Amazon, Apple, and Microsoft, access to its unreleased Claude Mythos model to prepare cybersecurity defense

AAPLAVGOCSCOCRWDGOOGLMSFTNVDAPANWZSSOKTANTSKTENB
Artificial IntelligenceCybersecurity & Data PrivacyTechnology & InnovationInfrastructure & DefenseGeopolitics & War

Project Glasswing: Anthropic is providing preview access to its unreleased Claude Mythos model to roughly 50 tech, cybersecurity and critical-infrastructure organizations (including AWS, Apple, Google, Microsoft, NVIDIA, CrowdStrike and JPMorgan) to scan and secure systems; Anthropic says the Mythos Preview has identified thousands of zero-day vulnerabilities, including a 27-year-old OpenBSD bug. Following initial reports, shares of several security vendors fell roughly 5%–11%, and Anthropic warns Mythos materially increases the likelihood of large-scale AI-driven cyberattacks this year, creating sector-level downside risk for incumbent security products and potential implications for national security and critical infrastructure.

Analysis

Front-line consequence: models that reliably surface hard-to-find vulnerabilities reprice demand away from legacy signature/rule-focused vendors toward platform-level, inference-heavy solutions and managed services. Expect a 6–18 month transition where incumbent security point-products face margin pressure (we estimate 100–300bps of gross-margin compression) as customers migrate budget to continuous, AI-driven scanning and cloud-hosted remediation pipelines. Second-order winners will be owners of ML inference stack and tooling (GPU suppliers, cloud hyperscalers, MLOps vendors) that monetize both compute and higher-ARPU managed offerings; they should capture the lion’s share of incremental spend because defensive tooling becomes a continuous service rather than a periodic product sale. Conversely, narrow detection/playbook vendors without native LLM integration are exposed to churn and loss of pricing power — this bifurcation will sharpen within 12 months and accelerate M&A of laggards. Catalysts and tail risks are asymmetric: a high-profile, AI-enabled breach would turbocharge defense budgets and favor platform players, while model errors (false positives/negatives) or fast open-source replication could blunt vendor pricing power and democratize defenses. Regulatory intervention (export controls, liability frameworks) is a 3–12 month tail risk that would reroute investment flows and could temporarily benefit larger, compliance-oriented suppliers. Tradeable timeframe is near-term volatility (weeks) into a structural re-rating over 6–18 months; best execution will come from risk-managed pairs that long AI/infra exposure and short vulnerable niche security vendors, plus optionality to capture convex upside from accelerated enterprise AI spend or downside from a regulatory shock.