{"id":4007,"date":"2026-05-07T18:00:00","date_gmt":"2026-05-07T16:00:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=4007"},"modified":"2026-05-08T07:11:51","modified_gmt":"2026-05-08T05:11:51","slug":"the-new-reality-in-cybersecurity-ai-agents-acceleration-and-asymmetry","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/the-new-reality-in-cybersecurity-ai-agents-acceleration-and-asymmetry\/","title":{"rendered":"The New Reality in Cybersecurity: AI Agents, Acceleration, and Asymmetry"},"content":{"rendered":"\n<p>The conversation around AI in cybersecurity has shifted dramatically in just a few months. What used to be theoretical is now operational. AI is no longer limited to assisting \u2014 it can actively perform large parts of the work. We are entering a phase of rapid, uneven acceleration \u2014 and the implications are uncomfortable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI Agents Can Identify New Vulnerabilities \u2013 Fast<\/h2>\n\n\n\n<p><strong>Claude Mythos<\/strong> is another milestone, but progress had already become apparent in the preceding months. Anthropic OPUS 4.6, released in February 2026, is already very efficient and versatile in vulnerability identification and exploitation.<\/p>\n\n\n\n<p>At Certitude, we have always been active in vulnerability research. We have found new zero-days during pentests or in independent research projects. This included products from large vendors such as Microsoft, IBM, Red Hat, Citrix, and Cloudflare. Traditionally, discovering zero-days or working on CVEs required a mix of deep expertise, time, and persistence. Now, the baseline has changed. With newer AI systems, we\u2019re seeing:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dramatically increased efficiency<\/li>\n\n\n\n<li>Automation of large parts of the workflow<\/li>\n\n\n\n<li>End-to-end support \u2014 from idea generation to exploit development to reporting<\/li>\n<\/ul>\n\n\n\n<p>Over the past two months, we have <strong>reported more vulnerabilities than in the previous two years<\/strong> combined. Not because we suddenly became more capable \u2014 but because AI agents handled roughly 80% of the work, allowing us to identify significantly more vulnerabilities within the same time. For example, the agent automatically generated a working proof-of-concept exploit and a structured vulnerability report, reducing manual effort to validation and refinement.<\/p>\n\n\n\n<p>However, this <strong>capability is<\/strong> <strong>not exclusive to defenders<\/strong>. As with dual-use tools in the past, they will also help attackers. This accelerates the cat-and-mouse dynamic we have experienced in cybersecurity for the last few decades.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Risks Caused By Acceleration<\/h2>\n\n\n\n<p>Official data from the National Vulnerability Database (NVD) shows that the rate of Common Vulnerabilities and Exposures (CVE) disclosures has accelerated significantly. This acceleration in vulnerability discovery has prompted the National Institute of Standards and Technology (NIST) to fundamentally alter its operations, moving from analyzing every CVE to a risk-based prioritization model.<a href=\"https:\/\/www.nist.gov\/news-events\/news\/2026\/04\/nist-updates-nvd-operations-address-record-cve-growth\">[1]<\/a> <strong>Between 2020 and 2025<\/strong>, the average daily disclosure rate was approximately <strong>86 CVEs per day<\/strong>. In early 2026, the disclosure velocity escalated dramatically. Between January 1 and April 29, <strong>2026<\/strong>, the NVD recorded an average of <strong>~184 CVEs per day<\/strong>, an <strong>increase of 113%<\/strong> over the average of the previous years, effectively breaking the agency&#8217;s capacity to enrich every vulnerability.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"945\" height=\"532\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/05\/Daily-CVE-Disclosure-Rate-1.png\" alt=\"\" class=\"wp-image-4009\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/05\/Daily-CVE-Disclosure-Rate-1.png 945w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/05\/Daily-CVE-Disclosure-Rate-1-300x169.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/05\/Daily-CVE-Disclosure-Rate-1-768x432.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><figcaption class=\"wp-element-caption\">Own visualization based on data from the <br>National Vulnerability Database (NVD), nvd.nist.gov<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Triage Bottlenecks<\/strong><\/h3>\n\n\n\n<p>Because of the large number of vulnerabilities that have been published in recent weeks, we see a <strong>triage bottleneck<\/strong> at large software manufacturers. This results in longer <strong>delays for patch development<\/strong>. We expect them to catch up at some point, due to more adoption of AI in these teams as well, but the transition could take some time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Resource Constraints<\/strong><\/h3>\n\n\n\n<p>Current frontier AI models are <strong>accelerating vulnerability discovery on both sides<\/strong>, but most organizations don\u2019t have the skills or resources to be an early adopter of AI in cybersecurity. If they are lucky, they have some IT staff savvy with AI, but typically it\u2019s not enough to bring rapid improvements to all the different aspects of cybersecurity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Growing Asymmetry Between Attackers And Defenders<\/h3>\n\n\n\n<p>And it\u2019s not just about resources; it\u2019s also about quality. Whereas attackers can just try out new exploits without much risk if they fail (they can simply try repeatedly until it works somewhere), defenders probably will not allow AI to act autonomously within the corporate network, if it is not as reliable as human professionals. Who takes responsibility if the agent takes wrong actions or misbehaves? Who wants to have service outages because it disabled a critical service in response to an open vulnerability on the server? While these questions are discussed, the asymmetry between attackers and defenders is growing: a larger attack surface and faster exploitation speed favor the offense.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Risks From AI Usage<\/h2>\n\n\n\n<p>The rise of agentic AI doesn\u2019t just improve productivity \u2014 it introduces entirely new risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Governance Risks<\/h3>\n\n\n\n<p>One key question is: <strong>How do we control what autonomous agents do?<\/strong><\/p>\n\n\n\n<p>One example out of our vulnerability research is an agent used to research exploits which had been explicitly instructed to operate transparently, but sometimes attempted to disguise its behavior \u2013 effectively simulating evasive tactics. It was not deterministic when it would behave as instructed and when not. That\u2019s not just a technical issue; it\u2019s a governance problem.<\/p>\n\n\n\n<p>We\u2019re dealing with systems that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>May act autonomously<\/li>\n\n\n\n<li>Interact with sensitive data and systems in our corporate networks<\/li>\n\n\n\n<li>Might have access to the Internet<\/li>\n\n\n\n<li>May behave in unintended ways<\/li>\n<\/ul>\n\n\n\n<p>A dangerous mix.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Prompt Injection: Still Unsolved<\/h3>\n\n\n\n<p>Despite all progress, <strong>prompt injection remains an open problem<\/strong>.<br>This keeps AI systems inherently susceptible to manipulation \u2014 particularly in environments where they interact with external or untrusted inputs. In an attempt to solve a problem, the AI agent might research online, find an instruction manual and execute the commands described. What if this instruction manual was manipulated? An attacker could gain code execution on our system, exfiltrate data or gain control over internal IT systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Identity Is Breaking: Voice &amp; Video Spoofing<\/h3>\n\n\n\n<p>Humans are biologically wired to trust faces and voices \u2013 a capability refined over millions of years. And now, within months, AI is breaking that trust model. Voice spoofing is already highly convincing and video impersonation is rapidly improving. <strong>Within months, organizations\u2014and society at large \u2013 will need to retrain people<\/strong> and establish new methods of identity verification for phone or video calls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s The Outlook?<\/h2>\n\n\n\n<p>Cybersecurity has always been asymmetric:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Defenders need to secure all possible attack vectors. Attackers only need to find one.<\/li>\n<\/ul>\n\n\n\n<p>Agentic models add another asymmetry:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Defenders require accuracy and stability (no outages). Attackers can tolerate failure and noise. In other words: Defenders need <strong>human-in-the-loop validation<\/strong>. Attackers don\u2019t. That difference matters more as speed increases.<\/li>\n<\/ul>\n\n\n\n<p>This creates a (hopefully temporary) but critical imbalance\u2014where attackers adopt faster than defenders can respond. We are likely entering a <strong>temporary phase of chaos<\/strong> where attackers effectively leverage AI and defenders are still adapting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What About Guardrails?<\/h3>\n\n\n\n<p>There\u2019s an ongoing call for guardrails in AI systems, which aim to prevent AI models from working on potentially harmful tasks. But this raises a difficult question: <strong>Who is actually being constrained?<\/strong><\/p>\n\n\n\n<p>This situation is comparable to banning dual-use tools like Nmap or Mimikatz: These tools are essential for defenders in vulnerability identification. But they are also used by attackers for the same reason. Guardrailed AI models will also make it more difficult for the good guys to use AI for cyber defense. And attackers will likely find ways around guardrails or use good unrestricted models altogether.<\/p>\n\n\n\n<p>Guardrails may slow development (on both sides) \u2013 but they do not meaningfully reduce risk. Organizations must prepare for a world where capable, unrestricted models are widely available.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Can Organizations Do?<\/h3>\n\n\n\n<p>The fundamentals still apply. AI doesn\u2019t change the rules of the game, but it changes its speed. Organizations don\u2019t need entirely new security principles \u2013 but they do need a change of mindset:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Faster execution<\/li>\n\n\n\n<li>Higher automation<\/li>\n\n\n\n<li>Lower trust in assumptions<\/li>\n<\/ul>\n\n\n\n<p>Key recommendations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Accelerate patch cycles: We need to apply patches faster. If there is a patch, there will likely be an exploit much sooner than we expect.<\/li>\n\n\n\n<li>Defense in depth: This principle applies more than ever. We have to expect attackers to find a way around our controls, so hopefully an additional measure stops or delays them. Microsegmentation, least privilege, MFA even for non-internet-facing systems, could be parts of it.<\/li>\n\n\n\n<li>Detection &amp; Response: Improve detection and response capabilities. Attacks will happen faster and more often, but when and how well will your organization react?<\/li>\n\n\n\n<li>Internal AI capabilities: Build internal skills and integrate AI in security workflows. It might start with experiments and proofs of concept (PoCs), but it will soon result in improved capabilities, quality and speed. But don\u2019t forget to consider AI risks and design such systems securely before production usage.<\/li>\n<\/ul>\n\n\n\n<p>The goal is not to \u201cwin\u201d outright \u2013 but to ensure the <strong>gap does not become<\/strong> <strong>unmanageable<\/strong>.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>At Certitude, we continuously adapt our services to reflect these developments\u2014and pass these gains on to our clients.<a id=\"_msocom_1\"><\/a><\/p>\n\n\n\n<p>For more information on how these developments may affect your organization, feel free to <a href=\"https:\/\/certitude.consulting\/contact.html\">contact<\/a> us.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Authors:<br>Marc Nimmerrichter, Managing Partner, Certitude Consulting GmbH<br>Florian Schweitzer, Cyber Security Experte, Certitude Consulting GmbH<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The conversation around AI in cybersecurity has shifted dramatically in just a few months. What used to be theoretical is now operational. AI is no longer limited to assisting \u2014 it can actively perform large parts of the work. We are entering a phase of rapid, uneven acceleration \u2014 and the implications are uncomfortable. AI [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4023,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,103],"tags":[316,762,837],"class_list":["post-4007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-vulnerability-research-en","tag-ai","tag-cyber-security","tag-vulnerabilities"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/4007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=4007"}],"version-history":[{"count":11,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/4007\/revisions"}],"predecessor-version":[{"id":4045,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/4007\/revisions\/4045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/4023"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=4007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=4007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=4007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}