In a step-change moment for cybersecurity, last month Anthropic announced Claude Mythos, a model with significantly stronger cyber capabilities than its predecessors. As they respond to the changing threat landscape, financial services firms will need to consider what it means for their operational resilience and compliance with regulatory obligations. In doing so, they should anticipate that Mythos is not going to be a one-off but rather marks the start of a trend requiring firms to continuously review their vulnerabilities as AI models improve.
The Claude Mythos concern
Anthropic has claimed that Mythos could identify and exploit hidden vulnerabilities across all major operating systems and browsers. Early testing suggested it could autonomously generate working exploits and discover thousands of critical flaws. When released to the public, Mythos could dramatically lower the barrier to sophisticated cyberattacks.
The financial sector’s exposure is not only its attractiveness to attackers but also its underlying architecture. Modern financial systems are highly interconnected. The International Monetary Fund has warned that AI‑driven cyber capabilities increase the risk that vulnerabilities in shared infrastructure could quickly multiply across institutions, elevating AI-enabled cyber risk to a financial stability concern.
An ongoing response to a growing threat
A natural response to the threat posed by models like Mythos is to look to the providers themselves to prevent misuse. AI providers like Anthropic and OpenAI have invested in guardrails designed to prevent models from being used to carry out attacks even when instructed to do so. In practice, however, these safeguards have proven difficult to enforce fully with users continuing to find ways to bypass them, particularly where novel techniques are used.
Recognising the threat from Mythos, in April 2026 Anthropic launched Project Glasswing, a collaboration between major technology and financial firms using a preview version of Mythos defensively to identify and fix vulnerabilities before they can be exploited.
But Mythos is not the only story. There are indications that GPT-5.5 can also carry out advanced cyberattacks, meaning that AI-enabled cyber threats are becoming a feature across multiple models. OpenAI have therefore announced a similar initiative called Daybreak for GPT-5.5.
As models continue to improve, they will find vulnerabilities that less capable models were unable to. The UK AI Security Institute has found that AI cyber capability appears to be doubling as fast as every 4.7 months. Models released in the coming months are therefore likely to be significantly more capable at finding vulnerabilities than Mythos and GPT-5.5. The implication is that each new generation of model may render the previous round of defensive testing incomplete.
Investing in operational resilience and human security awareness
Around the world, regulators have introduced regimes requiring financial services firms to build their resilience to operational disruption, including cyber attacks. For example, the Digital Operational Resilience Act (DORA) requires EU financial entities to assess cyber threats, use their ICT risk management framework to prepare for cyber attacks and, in some cases, run threat-led penetration testing. The UK’s Financial Conduct Authority, Prudential Regulation Authority and Bank of England impose operational resilience regimes on the firms they oversee.
Now regulators are highlighting the importance of meeting these requirements to address faster and more disruptive frontier AI-driven attacks. In the UK, a joint statement from HM Treasury, the FCA and Bank of England tells firms to take proactive steps to plan for and mitigate cybersecurity risks.
For financial services firms:
-
Operational resilience frameworks need to be stress tested against faster moving threats. Scenario tests should consider incidents that evolve more quickly than may be assumed in current playbooks. Firms will be under pressure to identify vulnerabilities more quickly and automate defences to operate at a comparable speed to AI-driven attacks.
-
Supply chain dependencies remain a central concern. The UK regulators say firms should manage frontier AI cyber risks from third parties and supply chains, including open-source software. Firms should be prepared to address and remediate vulnerabilities identified by third parties “at scale”.
-
Vulnerability management will be continuous.Given model capabilities are advancing so rapidly, meeting operational resilience obligations will increasingly demand ongoing review of a firm’s systems.
-
Boards and senior management should also have sufficient understanding of AI risks. This will then drive resourcing decisions, including whether firms have appropriate insurance in place.
Even where technical systems are secure, non-technical attacks are still a threat. In February 2026, the Dutch telecoms company Odido was hacked through the use of voice impersonations that bypassed its cyber defences. As voice impersonation, phishing and other social engineering techniques are deployed by AI at greater scale, firms will need to ensure that staff training evolves accordingly.
As AI-enabled cyber threats grow, so too does the potential legal and regulatory exposure for firms. Regulators will use regimes like DORA and the UK operational resilience framework to hold senior managers accountable for preparing to manage cyber risks and responding effectively when disruption happens. Firms that embed continuous review of their AI-related vulnerabilities into their governance frameworks will be best placed to meet their regulatory expectations, and the next Mythos.