AI Strategy

Anthropic's Project Glasswing Just Got Real — AWS, Apple, Cisco, Google, JPMorgan And Microsoft Now Use Claude Mythos To Hunt Vulnerabilities

On 12-13 May 2026, Anthropic confirmed the full enterprise rollout of Project Glasswing — its cybersecurity programme giving select major organisations early access to Claude Mythos Preview, the frontier reasoning model Anthropic specifically tuned for vulnerability discovery and security research. The named partners are extraordinary: AWS, Apple, Cisco, Google, JPMorgan Chase, and Microsoft. The capability is equally striking: in initial deployments Claude Mythos has identified thousands of zero-day vulnerabilities across enterprise software estates that traditional security tooling missed entirely. For UK enterprise security leaders, this is the moment AI-powered vulnerability research moved from research curiosity to production-grade capability deployed at the largest enterprises on earth. Here is the complete read.

 ·  12 min read  ·  By BraivIQ Editorial

Anthropic's Project Glasswing Just Got Real — AWS, Apple, Cisco, Google, JPMorgan And Microsoft Now Use Claude Mythos To Hunt Vulnerabilities

6 — Named launch partners: AWS, Apple, Cisco, Google, JPMorgan Chase, Microsoft  ·  Thousands — Zero-day vulnerabilities Claude Mythos Preview identified across enterprise software in initial Project Glasswing deployments  ·  May 12-13 2026 — Full Project Glasswing enterprise rollout announcement window  ·  40% — Anthropic's share of enterprise LLM API spend — the structural advantage Project Glasswing builds on (Menlo Ventures benchmark)

On 12-13 May 2026, Anthropic confirmed the full enterprise rollout of Project Glasswing — the cybersecurity programme giving select major organisations early access to Claude Mythos Preview, Anthropic's frontier reasoning model specifically tuned for vulnerability discovery and security research. The named launch partners are, on any measure, extraordinary. AWS. Apple. Cisco. Google. JPMorgan Chase. Microsoft. The fact that six of the largest, most security-conscious enterprises on the planet have publicly committed to Glasswing is a strategic signal of unusual clarity: AI-powered vulnerability research has moved from research curiosity to production-grade enterprise capability, and the capability differential between Glasswing-equipped organisations and those without is material.

The reported capability is equally striking. In initial Project Glasswing deployments, Claude Mythos Preview has identified thousands of zero-day vulnerabilities across enterprise software estates that traditional security tooling missed entirely. These are not theoretical findings; they are production vulnerabilities that the named partners' existing security tooling — among the most sophisticated in the world — did not catch. For UK enterprise security leaders, the implications are significant. Glasswing represents a structural shift in what AI-augmented security operations can do, what the threat actors are likely to do in response (Mythos-class capability will not stay confined to defenders for long), and what UK enterprises that are not in the launch cohort should be doing in the next 90 days to keep pace. Here is the complete UK enterprise security read.

What The Named-Partner Roster Actually Signals

The six named launch partners are not a random sample. They represent a deliberate strategic concentration that tells you something about Anthropic's view of the cybersecurity market and the operational reality of AI-augmented security at scale. Four observations follow from the roster.

  • AWS, Google, Microsoft — the three major hyperscalers — are all in. Their participation means the security infrastructure underlying the bulk of global cloud computing is being audited by Mythos. The downstream implication is that vulnerabilities Mythos finds in hyperscaler-operated systems get fixed faster than they otherwise would, which improves the security baseline for all hyperscaler customers — including most UK businesses.
  • Apple's participation matters specifically because Apple controls iOS and macOS, the dominant consumer endpoints. Mythos-class vulnerability discovery applied to iOS reduces the long tail of zero-days available to threat actors targeting iPhone and Mac users — including UK consumers and the BYOD endpoint estates of most UK enterprises.
  • Cisco's participation reaches the networking infrastructure layer. Vulnerabilities in Cisco hardware and software historically have been some of the most impactful security disclosures in any given year. Mythos applied to the Cisco estate is meaningful for global network security baseline.
  • JPMorgan Chase's participation is the financial-services anchor. JPM has, by reputation, one of the most sophisticated CISO functions in any commercial enterprise. Their participation signals that Mythos-class capability has crossed the threshold where the largest, most-discriminating financial-services security functions consider it production-ready.

How Claude Mythos Works In Vulnerability Discovery

Claude Mythos Preview is Anthropic's frontier reasoning model — a successor to the Claude 4 family with substantially deeper reasoning, longer context handling, and specific tuning for security research tasks. The vulnerability-discovery workflow that Project Glasswing operates on combines four distinct capabilities. First, codebase ingestion — Mythos can read entire enterprise codebases (millions of lines) in a single context window and develop genuine architectural understanding of the systems it is reviewing. Second, vulnerability pattern recognition — Mythos has been specifically trained on the broad corpus of historical security disclosures, vulnerability patterns, and defensive engineering practice, giving it deep familiarity with what known vulnerability classes look like across many languages and frameworks. Third, novel vulnerability synthesis — Mythos can reason about how known vulnerability patterns might apply in new contexts, identifying potential issues that human security researchers would not catch because the contextual pattern is too obscure.

Fourth, exploitability analysis — Mythos can reason about whether a theoretical vulnerability is actually exploitable in the specific deployment context, distinguishing real findings from theoretical concerns. This last capability is, on present evidence, what separates Mythos from earlier-generation AI security tools that produced high false-positive rates and overwhelmed human security teams with low-quality findings. The Mythos output is, by the named partners' reports, materially higher signal-to-noise than previous tooling — meaning the human security team can act on Mythos findings without the triage overhead that drowned earlier AI security efforts.

What This Means For UK Enterprise Security

For UK enterprise CISOs, security leaders, and the broader UK cybersecurity community, Project Glasswing has four practical implications that deserve immediate attention.

1. The Defender-Attacker Capability Race Just Accelerated

Mythos-class capability is going to reach threat actors too, on a timeline measured in months rather than years. The defender advantage created by Project Glasswing is real and substantial in the near term — but it will be matched by attacker-side AI capability eventually. UK CISOs that engage with the Glasswing-equivalent ecosystem early get the longest defender-advantage window. UK CISOs that defer engagement until 'the capability is more proven' will find themselves with the defender disadvantage by 2027.

2. AI-Augmented Vulnerability Discovery Is Becoming Procurement-Standard

Through 2026 and 2027, UK enterprise security procurement is going to converge on the assumption that AI-augmented vulnerability discovery is a standard component of the security stack, not an experimental capability. Vendor RFPs for security tooling will increasingly require AI capability as a baseline. UK CISOs that have not engaged with this trend by Q1 2027 will face procurement-process complications. The right time to engage is now, while the engagement still represents leadership rather than catch-up.

3. The UK NCSC Posture Matters

The UK National Cyber Security Centre's posture on AI-augmented security tooling is, on present evidence, supportive — consistent with the broader UK regulatory pro-AI stance. NCSC guidance through 2026 has emphasised the operational benefits of AI in defensive cybersecurity while highlighting the need for governance, observability, and human-in-the-loop architecture. UK enterprise CISOs deploying AI security tooling should be designing programmes that align with NCSC guidance from day one — the alignment is straightforward, the documentation overhead is bounded, and the operational defensibility is materially stronger.

4. The FCA Operational Resilience Connection

For UK financial services firms, FCA operational resilience expectations have been ratcheting up through 2026. AI-augmented security capability is increasingly part of how FCA-regulated firms demonstrate genuine operational resilience rather than tick-box compliance. UK financial services CISOs should be engaging explicitly with the question of how AI security tooling fits into their SM&CR-level operational resilience reporting. The connection between Glasswing-equivalent capability and FCA reporting is genuinely substantive.

The 90-Day UK CISO Response Playbook

  1. Days 1-14: Engage with Anthropic about Claude API access for security workloads, even if direct Project Glasswing participation is not currently available. Most UK enterprise security functions can deploy Claude through standard API access for vulnerability discovery use cases.
  2. Days 15-30: Pilot AI-augmented vulnerability discovery on a defined scope — typically a single application or service. Compare Mythos / Claude / equivalent findings against the existing security tooling baseline. The capability gap is consistently substantial enough that the pilot result is unlikely to surprise; the operational learning is the value.
  3. Days 31-50: Build the human-in-the-loop security workflow. AI vulnerability discovery findings need human triage, validation, and prioritisation. Define the workflow, train the team, set the SLA expectations. This is the operational layer that determines whether the AI capability translates to actual security improvements.
  4. Days 51-70: Update your CISO reporting to the board. AI-augmented security capability deserves explicit board-level attention — both for the capability uplift and for the governance posture. Brief your audit committee, board risk committee, and regulator-facing functions on what is changing and how.
  5. Days 71-90: Plan the 2027 security architecture refresh. AI security tooling is moving fast enough that your 2027 security architecture will look meaningfully different from your 2026 architecture. Get the strategic refresh planning underway before Q4 2026 procurement decisions force the work.

Sources

  1. Anthropic — Project Glasswing Announcement And Partner Roster (May 2026)
  2. Anthropic — Building A New Enterprise AI Services Company With Blackstone, Hellman & Friedman, And Goldman Sachs
  3. Insurance Journal — Anthropic Touts AI Cybersecurity Project With Big Tech Partners
  4. Crescendo — Latest AI News And Updates
  5. AI Agent Store — Daily AI Agent News (May 2026)
  6. Dentro — AI News May 2026: Key Events & Releases
  7. ImFounder — 7 Explosive AI Updates In May 2026 That Every Founder Must Know
  8. Honeycomb — Agent-Native Observability For Multi-Agent Workflows (May 2026 Launch)
  9. Sweet Security — Continuous Agentic Red-Teaming Product Details (May 2026)
  10. Dotmatics — Luma Agent Announcement (May 2026)
  11. Broadridge — Production-Ready Agentic Capabilities In Post-Trade And Client Services
  12. UK NCSC — Guidance On AI In Cybersecurity Operations