Back to Articles

The Bug Isn't the Bug. The Patch Is.

The Bug Isn't the Bug. The Patch Is.
[
Blog
]
Julien Bonnay, Managing Partner, US
Published:
April 28, 2026

Claude Mythos Preview dropped two weeks ago. The debate has split in two. Both sides have a point. Neither is about the real problem.

One side points to real patched bugs in FreeBSD, OpenBSD, and FFmpeg. The other calls the "thousands of zero-days" claim marketing ahead of evidence.

The Mythos debate is about discovery. For defenders, discovery was never the problem. Remediation is. And almost no one is putting AI there.

Attackers weaponize in roughly 5 days. Most institutions set critical-patch SLAs at 7 to 30 days and regularly miss them. That gap predates Mythos. Mythos is about to widen it.

The cost of the gap isn't abstract anymore. Unremediated critical vulnerabilities now trigger forced disconnections, mandatory breach disclosures, operational outages lasting days, and contractual penalties from partners. "We'll patch it after the release window" has a P&L line.

After years advising global institutions on patch management, four failures show up more than any others:

  1. Orchestration is slow. Tickets crawl across infrastructure, app owners, business lines, and vendors with no one running throughput.
  2. IT priorities compete, and patching loses. Security patches are negotiated against every release window, feature deadline, and migration.
  3. Patching isn't automated. Fear of breaking production outweighs fear of being breached.
  4. AI is largely absent from remediation itself. Most copilots sit on the detection side. Almost none on the execution side. If AI is only summarizing alerts for analysts, patch execution doesn't move. If AI is reading advisories, writing staging tests, and drafting rollback plans, remediation moves.

Finding bugs was never the bottleneck. Moving once you know is.

Four moves I would prioritize for the next 90 days:

  • Empower your remediation conductor. Most large institutions have the title on the org chart. Ensure yours has written authority to override release windows, a dedicated throughput team (not a reporting team), and ownership of vendor patch SLAs.
  • Reprice automation risk. Not automating is the bigger risk now. AI-drafted rollbacks make automation's downside recoverable in minutes. The status quo isn't conservative, it's slow.
  • Put AI inside remediation, not just around it. Patch-note parsing. Staging test generation. Change-ticket drafting. Each one removes a handoff that was slowing remediation down.
  • Run a Mythos-class tabletop. An AI-assisted adversary publishes a working exploit for your top-three vendors at 02:00 on a Sunday. Walk the first 72 hours.

One adjacent frontier: app-layer vulnerabilities with no vendor patch. AI-assisted code rewriting is the next remediation pathway there. Different pipeline, same thesis.

Mythos may move the discovery curve. Defenders move the remediation one.

Need help closing the remediation gap before it closes on you? That's what we do. Talk to us here.

Got a complex challenge?
Let’s solve it – together, and for real
Frequently Asked Questions

Relevant Insights

View All
#
[
Blog
]
7 Best Practices for Building a Responsible AI Agent Governance Framework

Enable AI agent governance that ensures autonomy, compliance, and results fast.

[
Blog
]
AI Interface Orchestration for Retail Banking – Part 1

AI in banking must be exact. Part 1 of this 4 part series introduces interface orchestration to prevent hallucinations and protect trust by design.

[
Blog
]
AI Interface Orchestration for Retail Banking - Part 4

Interface orchestration helps banks scale AI safely, boosting trust, compliance, efficiency, and innovation without risking data accuracy.

[
Blog
]
AI Interface Orchestration for Retail Banking - Part 3

Retail banking AI builds trust by clearly separating verified data from AI guidance through transparent, labeled interfaces.