{"id":2421,"date":"2026-04-14T02:10:17","date_gmt":"2026-04-14T09:10:17","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2421"},"modified":"2026-04-15T06:24:45","modified_gmt":"2026-04-15T13:24:45","slug":"mythos-moak-ctem-and-the-end-of-cve-chasing","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/","title":{"rendered":"Mythos, MOAK, CTEM and the End of CVE Chasing"},"content":{"rendered":"\n<p>A few weeks ago the world was exposed to <a href=\"https:\/\/www.anthropic.com\/glasswing\" rel=\"nofollow\">Mythos<\/a>, Anthropic&#8217;s new frontier model and the Project Glasswing announcement that came with it.<\/p>\n\n\n\n<p>The reaction across the industry was immediate. <a href=\"https:\/\/www.cnbc.com\/2026\/03\/27\/anthropic-cybersecurity-stocks-ai-mythos.html\" rel=\"nofollow\">Cybersecurity stocks fell sharply<\/a>. The Treasury Secretary convened an emergency meeting with major bank CEOs. 250 CISOs produced a response playbook over a single weekend.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1068\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-1280x1068.png\" alt=\"\" class=\"wp-image-2428\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-1280x1068.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-512x427.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-768x641.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146.png 1440w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\">Sources: CNBC, Bloomberg, Investing.com<\/figcaption><\/figure>\n\n\n\n<p>That is not a typical announcement or a PR &#8220;leak&#8221;. That is a reckoning.<\/p>\n\n\n\n<p>Then, about a week later, I came across <a href=\"https:\/\/moak.ai\" rel=\"nofollow\">MOAK<\/a>. If Mythos is the earthquake, MOAK, for me, was the aftershock that shows the ground has already shifted.<\/p>\n\n\n\n<p>Built by security researchers Yair Saban and Niv Hoffman, MOAK (Mother of All KEVs) is a proof of concept that demonstrates something most people weren&#8217;t ready to hear: you don&#8217;t need Mythos to have a serious problem. Using publicly available models, including Claude Opus 4.6 and GPT 5.4, it shows that agentic workflows can already autonomously exploit known vulnerabilities with no human in the loop.<\/p>\n\n\n\n<p>No special access needed. No frontier model required.<\/p>\n\n\n\n<p>In this post I want to talk about what both of these things are actually telling us, and why I think the industry is at risk of drawing the wrong conclusion.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The End of CVE Chasing<\/h2>\n\n\n\n<p>The instinctive reaction to Mythos is: we need to patch faster. That instinct is understandable. It is also exactly the wrong frame.<\/p>\n\n\n\n<p>Security teams have spent years organizing around a model that goes: wait for a CVE, score its severity, add it to the queue, remediate in priority order. It is rational given the volume of disclosures. But it assumes defenders have time to react. <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/time-to-exploit-trends-2023\" rel=\"nofollow\">According to Google Mandiant<\/a>, average time-to-exploit dropped from 63 days in 2018 to just 5 days in 2023.<\/p>\n\n\n\n<p>As alarming as that is, things are much worse for high-profile vulnerabilities, where the time between disclosure and active exploitation is measured in hours. And this is exactly the issue. The math just doesn&#8217;t work anymore. The patch cycle was never built for a few-hours window, and it cannot be retrofitted for one.<\/p>\n\n\n\n<p>This is not to say that &#8220;patching is dead.&#8221; Such dramatic proclamations have a poor track record, and there is no need for me to add to it.<\/p>\n\n\n\n<p>What this is, is an argument about trajectory. As the exploit window narrows and the bar to exploitation drops, CVE remediation covers a shrinking fraction of actual risk. The practice is not irrelevant yet, but it will become less efficient with every passing month, and the direction is not reversing.<\/p>\n\n\n\n<p>But the shrinking exploit window is only part of the story. The deeper issue is what CVE lists don&#8217;t capture: dangerous misconfigurations, expired certificates, and shadow infrastructure that time forgot, but bad actors won&#8217;t. <\/p>\n\n\n\n<p>A security program organized around CVE remediation ignores all of those and optimizes for a subset of actual risk. <\/p>\n\n\n\n<p>Mythos doesn&#8217;t care about your subsets. Neither will any attacker.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Zero-Day Exploitation, Democratized<\/h2>\n\n\n\n<p>Developing a working zero-day exploit has always required serious resources: deep technical expertise, time, and access to private research. That kept the barrier high enough that, until recently, <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/2024-zero-day-trends\" rel=\"nofollow\">53% of attributed zero-days came from nation-state actors<\/a>. The remaining share came from well-funded commercial surveillance vendors and sophisticated criminal groups.<\/p>\n\n\n\n<p>The common thread: capability that most threat actors simply couldn&#8217;t reach. <\/p>\n\n\n\n<p>That barrier is gone.<\/p>\n\n\n\n<p>To understand what the new frontier looks like, the UK&#8217;s AI Security Institute <a href=\"https:\/\/www.aisi.gov.uk\/blog\/our-evaluation-of-claude-mythos-previews-cyber-capabilities\">independently evaluated Mythos<\/a>. It became the first model to complete their 32-step corporate network attack simulation end-to-end. The AISI estimated the simulation would take a human professional 20 hours. Mythos completed it autonomously.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"800\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-144-1280x800.png\" alt=\"\" class=\"wp-image-2423\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-144-1280x800.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-144-512x320.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-144-768x480.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-144-1536x960.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-144.png 1980w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/www.aisi.gov.uk\/blog\/our-evaluation-of-claude-mythos-previews-cyber-capabilities\" rel=\"nofollow\">AISI<\/a><\/figcaption><\/figure>\n\n\n\n<p>Mythos made the scale of this visible. But MOAK research makes it actionable. Claude Opus 4.6 and GPT 5.4, models available to anyone with an API key today, already show autonomous exploitation rates of around 80% against real-world KEVs. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"716\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-143-1280x716.png\" alt=\"\" class=\"wp-image-2422\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-143-1280x716.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-143-512x286.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-143-768x429.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-143.png 1293w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/moak.ai\/\" rel=\"nofollow\">MOAK<\/a><\/figcaption><\/figure>\n\n\n\n<p>So what do it mean? It means that the capability Anthropic is trying to contain in Mythos already exists in in the open market.<\/p>\n\n\n\n<p>Good news everyone, zero-day exploitation has been democratized. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Beyond CVEs<\/h2>\n\n\n\n<p>If CVE chasing is the wrong model, what replaces it?<\/p>\n\n\n\n<p>Start with a different question. Not &#8220;what vulnerabilities do we need to patch?&#8221; but &#8220;what can actually be used against us right now?&#8221;<\/p>\n\n\n\n<p>This is the question attackers ask. It is the logic agentic AI follows.<\/p>\n\n\n\n<p>A CVE without external reachability is theoretical and largely irrelevant. Real risk is the intersection of what you expose, what is reachable from the outside, what is actually exploitable. <\/p>\n\n\n\n<p>Mythos and MOAK don&#8217;t consult your patch queue. They find what is reachable, confirm what is exploitable, and move in.<\/p>\n\n\n\n<p>Defenders have had many wake-up calls to look beyond CVE scores. This might be the final warning. The attack surface that matters includes misconfigurations, expired certificates, services with default credentials, APIs with no authentication on infrastructure nobody remembered to decommission&#8230; and many other attack paths that chain low-severity findings into critical access.<\/p>\n\n\n\n<p>None of these require a CVE number to be dangerous. Agentic AI will test all of them at scale, exploiting each opening in sequence, starting from the outside and working their way in.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What This Means in Practice<\/h2>\n\n\n\n<p>When an AI model can complete a 32-step network attack autonomously, the question of how many CVEs are in your remediation queue becomes the wrong question entirely. The right one is simpler: which of your exposed assets can actually be exploited right now?<\/p>\n\n\n\n<p>That is the shift <a href=\"https:\/\/www.cycognito.com\/learn\/exposure-management\/ctem\/\">continuous threat exposure management (CTEM)<\/a> is built around. Not periodic scanning against a known inventory, but continuous outside-in visibility into what is reachable and what is validated as exploitable.<\/p>\n\n\n\n<p>Getting ahead of this means stopping organizing around remediation queues and starting to look at your environment the way an attacker would: from the outside, without the benefit of an internal asset inventory, finding what is reachable before someone else does.<\/p>\n\n\n\n<p>Mythos and MOAK make the same argument from different directions. The threat is no longer constrained by attacker expertise, and it is no longer limited to what appears on a CVE list. Outside-in, continuous, validated exposure management is not a feature. It is the foundation.<\/p>\n\n\n\n<p>If you want to see how CyCognito approaches this problem, <a href=\"https:\/\/www.cycognito.com\/demo\/\">click here to schedule a 1:1 demo.<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The instinctive reaction to Mythos is: we need to patch faster. That instinct is understandable. It is also exactly the wrong frame. The real question isn&#8217;t how many CVEs are in your queue. It&#8217;s how many of your exposed assets can actually be exploited right now, by anyone with an API key and an afternoon.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[229,1],"tags":[],"class_list":["post-2421","post","type-post","status-publish","format-standard","hentry","category-featured","category-perspectives"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"The instinctive reaction to Mythos is: we need to patch faster. That instinct is understandable. It is also exactly the wrong frame. The real question isn&#039;t how many CVEs are in your queue. It&#039;s how many of your exposed assets can actually be exploited right now, by anyone with an API key and an afternoon.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-14T09:10:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T13:24:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"1202\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Mythos, MOAK, CTEM and the End of CVE Chasing\",\"datePublished\":\"2026-04-14T09:10:17+00:00\",\"dateModified\":\"2026-04-15T13:24:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\"},\"wordCount\":1047,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-1280x1068.png\",\"articleSection\":[\"Featured\",\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\",\"name\":\"Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-1280x1068.png\",\"datePublished\":\"2026-04-14T09:10:17+00:00\",\"dateModified\":\"2026-04-15T13:24:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146.png\",\"width\":1440,\"height\":1202},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mythos, MOAK, CTEM and the End of CVE Chasing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/","og_locale":"en_US","og_type":"article","og_title":"Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog","og_description":"The instinctive reaction to Mythos is: we need to patch faster. That instinct is understandable. It is also exactly the wrong frame. The real question isn't how many CVEs are in your queue. It's how many of your exposed assets can actually be exploited right now, by anyone with an API key and an afternoon.","og_url":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/","og_site_name":"CyCognito Blog","article_published_time":"2026-04-14T09:10:17+00:00","article_modified_time":"2026-04-15T13:24:45+00:00","og_image":[{"width":1440,"height":1202,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Mythos, MOAK, CTEM and the End of CVE Chasing","datePublished":"2026-04-14T09:10:17+00:00","dateModified":"2026-04-15T13:24:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/"},"wordCount":1047,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-1280x1068.png","articleSection":["Featured","Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/","url":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/","name":"Mythos, MOAK, CTEM and the End of CVE Chasing | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146-1280x1068.png","datePublished":"2026-04-14T09:10:17+00:00","dateModified":"2026-04-15T13:24:45+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-146.png","width":1440,"height":1202},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Mythos, MOAK, CTEM and the End of CVE Chasing"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2421"}],"version-history":[{"count":15,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2421\/revisions"}],"predecessor-version":[{"id":2447,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2421\/revisions\/2447"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}