Austin Prime Times

collapse
Home / Daily News Analysis / The exploit gap is closing, and your patch cycle wasn’t built for this

The exploit gap is closing, and your patch cycle wasn’t built for this

Apr 16, 2026  Twila Rosenbaum  24 views
The exploit gap is closing, and your patch cycle wasn’t built for this

The Cloud Security Alliance has identified a critical shift in the cybersecurity landscape: the time it takes for a discovered vulnerability to be exploited is diminishing quickly. This development poses significant challenges for organizations that rely on traditional patch cycles.

The briefing emphasizes Anthropic’s Claude Mythos, which has autonomously detected thousands of zero-day vulnerabilities across major operating systems and browsers. This AI system has generated working exploits without human intervention, achieving an impressive exploit success rate during internal testing.

Asymmetry in Offense and Defense

The core issue at hand is the asymmetry between offensive and defensive capabilities. Artificial intelligence has drastically reduced the cost and skill level required to identify and exploit vulnerabilities. In contrast, defenders continue to use patch cycles, risk models, and detection systems that are designed for threats that evolve at a human pace. Current systems were not built to respond to an environment where the average time-to-exploit now stands at under 20 hours, according to data from Sergej Epp’s Zero Day Clock.

The rate of offensive AI capabilities has been on the rise since mid-2025. For instance, in June 2025, the autonomous system XBOW topped HackerOne’s U.S. leaderboard. By August, Google’s Big Sleep identified 20 real-world zero-days in open-source projects. In November, Anthropic revealed that a Chinese state-sponsored group had utilized Claude Code to execute full attack chains across around 30 global targets. By February 2026, Anthropic reported over 500 high-severity vulnerabilities in open-source software using Claude Opus 4.6, while AISLE discovered 12 OpenSSL zero-days during the same period, including a CVSS 9.8 flaw dating back to 1998.

Recommendations for CISOs

To address these challenges, priority actions for Chief Information Security Officers (CISOs) are categorized into immediate, 45-day, and 90-day timelines. Recommendations include integrating LLM-based security reviews into CI/CD pipelines, formalizing the use of AI agents across all security functions, preparing for an influx of simultaneous patches, and updating risk models that were based on pre-AI assumptions about exploit timelines.

Implementing AI agent usage is now considered essential for operations. Optional programs have not been able to overcome cultural resistance, and teams without AI capabilities cannot keep pace with the speed of AI-enhanced attacks. Rich Mogull, Chief Analyst at the Cloud Security Alliance and a contributor to the briefing, highlighted the challenges organizations will face in this transition. He stated, “One of the biggest issues is lack of clarity and direction. To be successful, you ideally need to have approved providers and use cases, with enterprise-level subscriptions for governance and cost management, along with training on how and where to use them.”

Mogull also noted that skepticism among practitioners often arises from earlier negative experiences with less effective models, emphasizing that demonstration is more convincing than mere arguments.

On the topic of budget and personnel, Phil Venables, Partner at Ballistic Ventures and former CISO at Google Cloud, pointed to the need for systemic improvements throughout the software development and infrastructure lifecycle. He stated, “CISO teams, along with infrastructure and development teams, must enhance their software and IT management tools to meet the demand for quicker vulnerability remediation.” Venables framed the current situation as a catalyst for long-term changes that organizations previously recognized as necessary.

Furthermore, Mogull warned of the consequences of inaction, citing historical examples of major patch cycles that strained response capabilities, such as the Kaminsky DNS vulnerability and the Log4j incident. He cautioned that we might be facing multiple Log4j-level events each month, or even each week, due to the rapid evolution of threats.

Burnout as an Operational Risk

The anticipated surge in vulnerability disclosures will likely surpass anything security teams have previously experienced. The recommendation is to advocate for increased headcount and budgetary resources for reserve capacity before automation is fully implemented. Additionally, prioritizing staff resilience is critical, on par with technical controls.

Security teams are grappling with a higher volume of vulnerabilities, an increase in AI-assisted code deployment, and a broader attack surface concurrently. This situation raises the risk of burnout and attrition, which pose direct operational risks due to the scarcity of expertise needed during this tumultuous period.

The Importance of Basic Controls

Despite the advancements in AI, established security practices remain essential. High-priority actions include network segmentation, egress filtering, phishing-resistant multi-factor authentication, identity and access management, and patch management for known vulnerabilities. These measures increase the cost of attack, with egress filtering successfully blocking every public Log4j exploit.

Looking ahead, the briefing advocates for a dedicated Vulnerability Operations function modeled after DevOps practices, equipped and automated for continuous autonomous vulnerability discovery and remediation across an organization’s entire software estate.


Source: Help Net Security News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy