02 — The Catalyst & What Has Changed Since
A catalyst event, then three weeks of confirming evidence.
On 7 April 2026, Anthropic released Claude Mythos Preview — a frontier model with approximately 10 trillion parameters — and simultaneously announced Project Glasswing, granting roughly 50 organisations access for defensive cybersecurity. The model autonomously discovered thousands of zero-day vulnerabilities across every major operating system, browser, virtual machine monitor, and cryptographic library tested. A 27-year-old bug in OpenBSD, a 16-year-old vulnerability in FFmpeg, and a 17-year-old remote code execution vulnerability in FreeBSD (CVE-2026-4747) were among confirmed findings. The capabilities were not specifically trained — they emerged from general improvements in reasoning and code.
Mythos is not "the event that changed insurance." It is the most visible signal that AI is compressing exploit discovery and weaponisation cycles, which raises cyber accumulation risk, weakens static underwriting, and increases the value of patch-execution and external-exposure intelligence. What matters for this briefing is not the event — it is the evidence pattern that followed.
Four developments between 15 and 22 April that materially updated the thesis
1. Fitch Ratings endorsed the core mechanism (16 April)
In its brief on the cyber marketplace, Fitch identified Anthropic's Mythos model as raising "eyebrows in the financial and cybersecurity worlds." Its statement that vulnerabilities "will probably outnumber patches as the artificial intelligence tool works on cyber threat intelligence and incident response" is the same mechanism this briefing has described since 10 April. A detailed Fitch report on the cyber market is expected this summer — timed to land in the same window as Anthropic's July disclosure. For any APAC insurer seeking institutional cover for the thesis, this is it.
2. The cyber soft market is persisting — and is now explicitly flagged as the risk (21 April)
Morningstar DBRS published a report finding that "Middle East tensions may fuel cyber risk" but the soft market is "set to persist." US non-proportional cyber reinsurance rates fell approximately 32 percent at the April 1 renewals. The mispricing gap the 15 April version of this briefing described as an inference is now documented: reinsurers renewed 2026 cyber treaties at materially lower rates while marine war risk repriced by 20–50 times over the same period. The Hormuz-to-cyber analogy is no longer the most compelling piece of evidence — the analogy and the price divergence are both live.
3. The CVE-disclosure bottleneck is now the forcing function for July (15 April)
The Register revealed that among the "thousands" of vulnerabilities Mythos discovered, only one has a CVE directly attributable to Glasswing (CVE-2026-4747, the FreeBSD remote code execution flaw). Anthropic's public summary report, expected around July 2026, will therefore trigger not a single patch cycle but a CVE tsunami — potentially the largest coordinated disclosure event in the security industry's history. Reinsurers binding July treaties are making decisions on exposures that will be defined after the ink dries.
4. Domain 3 (AI liability) has shifted from emerging to live (March & April)
KYND's CTO Paulo Ferreira, writing in mid-March, articulated the Domain 3 thesis independently: "How will the widespread adoption of agentic AI generate claims that insurers haven't priced for?" Travelers launched a fully agentic AI claims assistant in February. Verisk has introduced new AI exclusion endorsements. The EU Product Liability Directive (implementation deadline 9 December 2026) explicitly includes software and AI as products capable of strict liability. The EU AI Act's next enforcement phase takes effect in August 2026. Liability for autonomous AI systems is no longer an "emerging coverage question." It is a dated regulatory calendar.
One calibration required
The 15 April version leaned heavily on AISLE's "Jagged Frontier" finding that small open-weights models can replicate showcase exploit discovery. Schneier's comment thread has since produced a credible technical counter: small models find known vulnerabilities when pointed where to look, but hallucinate when pointed at unfamiliar or patched code. This means cheap AI democratises the ability to rediscover what frontier AI has already surfaced — a real risk concentrated on the post-July disclosure window — but it does not mean every bad actor currently has an independent discovery capability. The thesis survives with a sharper edge: the threat crystallises at the moment of public CVE disclosure, not continuously. For insurers, this implies a specific action window.