Over the last several weeks, Palo Alto Networks and Unit 42 have been talking with CISOs and security leaders globally to discuss the emergence of frontier AI models and their broader implications on cybersecurity.
A clear theme has emerged. While the potential for AI-driven innovation is immense, the speed and scale at which these models can be weaponized poses a generational challenge to traditional security programs.
We’ve compiled the 10 most frequent questions we are receiving from customers to help you navigate this transition with practical, intelligence-led guidance.
1. What exactly is frontier AI and how does it differ from the large language models (LLMs) we’ve seen over the last couple of years?
Frontier AI refers to the most advanced, large-scale foundational models, such as the recently disclosed Anthropic Mythos model. These models demonstrate a significant leap in reasoning and coding fluency.
Unlike LLMs used for basic content generation, frontier models can autonomously identify software vulnerabilities, chain complex exploit paths and adapt to defensive controls in near-real-time. In our testing, these models accomplished the equivalent of a full year’s worth of manual penetration testing in less than three weeks.
2. With an anticipated wave of initial vulnerability findings from every tech vendor, how can organizations brace for a race to patch and triage?
We are moving from a world of N-days to a critical window of minutes. We already know that threat actors begin scanning for new CVEs in under 15 minutes. Frontier AI will accelerate this window, meaning attackers can discover and weaponize vulnerabilities at machine speed.
While we believe every company should enhance its vulnerability patching program, it will not be sufficient as attackers will find and exploit vulnerabilities before there are even patches available. Therefore, it is critical to ruthlessly prioritize findings based on attacker reachability, business impact and now AI exploitability.
3. Are open-source software (OSS) components at higher risk due to these models?
Our research shows that frontier models are exceptionally effective at analyzing source code, which puts open-source projects at immediate risk of large-scale supply chain compromises, at least in the short term. While OSS isn't inherently less secure, the transparency of the code allows AI models to find and test exploit chains more easily than in compiled commercial software.
For OSS, we recommend assuming compromise. Organizations should transition to using centralized, managed and hardened cool-down repositories so they can ensure enforcement of strict security governance and scanning before open-source code enters their production environment.
4. What is vulnerability chaining, and why is it a primary concern?
Vulnerability chaining is the process by which an AI model identifies multiple potentially lower-severity issues and links them together to create a single, critical-level exploit path. This capability allows attackers to bypass traditional security filters that might only flag individual medium risks, to identify the seams in a defense-in-depth strategy.
5. Can current security operations (SOC) keep up with autonomous attack agents?
Standard human-speed triage is no longer sufficient when attack cycles are measured in minutes rather than days. To defend against autonomous agents, SOC teams must shift toward AI-driven platforms that can deliver detection and response in single-digit minutes.
6. How does frontier AI impact reconnaissance and social engineering?
Attackers are using these models to rapidly scrape targeting intelligence and craft highly personalized, context-aware phishing scripts at scale. By analyzing press releases, LinkedIn profiles and job postings, AI can generate social engineering attacks that are virtually indistinguishable from legitimate business communications.
7. What does machine-speed defense look like in practice?
Machine-speed defense requires a shift-left strategy where frontier AI models are integrated directly into the software development lifecycle. This integration allows engineers to use these models to break their own software during development. Organizations must pair this with agentic endpoint security, 100% visibility and AI-driven automation to handle ingesting unprecedented volumes of telemetry in real-time.
8. How does frontier AI change the risk profile for identity and access management (IAM)?
Identity is now the most reliable path to attacker success, figuring in 89% of Unit 42 investigations. Frontier models excel at discovering over-privileged accounts and unmanaged tokens to move laterally. Defending against this requires moving to adaptive, risk-based authentication that responds at the speed of automated discovery.
9. How can we distinguish between marketing hype and real AI-driven threats?
While mass adoption of AI in large-scale campaigns is still emerging, the technical capability for autonomous hacking already exists within frontier models. The threat of frontier AI is not necessarily in them creating new techniques, but rather the unprecedented speed, scale and democratization of existing attack capabilities.
10. How is Palo Alto Networks specifically helping customers prepare for this shift?
Thousands of our best security engineers have been assessing frontier AI capabilities and developing best practices for using them effectively. We have also introduced Unit 42 Frontier AI Defense, an elite service that uses access to frontier models to identify your organization's likely attack paths before attackers can weaponize them.
Next Steps for Security Leaders
The shift to frontier AI requires both immediate tactical adjustments and long-term strategic transformation. To help you begin this journey, Palo Alto Networks CISO Marc Benoit created a Frontier AI CISO Checklist, which outlines the critical hardening steps your team should prioritize today.
For organizations requiring a deeper, customized assessment, our Unit 42 Frontier AI Defense Service provides a comprehensive exposure analysis and the roadmap needed for machine-speed defense.
Additional Resources
- Weaponized Intelligence – Nikesh Arora, Palo Alto Networks
- Defender's Guide to the Frontier AI Impact on Cybersecurity – Lee Klarich, Palo Alto Networks
- Introducing Unit 42 Frontier AI Defense – Sam Rubin, Palo Alto Networks
- Fracturing Software Security With Frontier AI Models – Insights, Palo Alto Networks, Unit 42
- Reclaim the AI Advantage – Unit 42, Palo Alto Networks
- Unit 42 Breaking Insights: Combat Risks from Frontier AI Models – On Demand Threat Briefing, Unit 42
- Assessing Claude Mythos Preview’s cybersecurity capabilities – Frontier Team Red, Anthropic
- Project Glasswing: Securing critical software for the AI era – Anthropic