AI-powered security research is tearing open decades of latent bugs across the entire stack. Volume isn't a trend. It's a step function.
Nearly a third of exploited vulnerabilities are weaponized on disclosure day. And CVEs are just one vector: leaked credentials are exploited within 12 hours; exposed Postgres databases are compromised within 30 seconds. If your patch cycle is monthly, you're not managing risk. You're documenting exposure after the fact.
Excalibur, an LLM-based pentest agent, compromised four of five hosts in a realistic AD environment for the cost of dinner — running parallel exploitation paths concurrently. The bug-to-exploit gap closed. Now the recon-to-exfiltration gap is closing too. Offense scales with compute. Defense scales with headcount.
Median is 29 minutes. AI-orchestrated attacks now run recon, vulnerability research, exploit authoring, lateral movement, and exfiltration autonomously. State actors did it first (Anthropic disrupted Chinese group GTG-1002 in September 2025, with Claude Code running 80-90% of operations independently). Small criminal groups followed (Mexican government breach, December 2025 to February 2026: 195 million records exfiltrated via Claude Code + GPT-4.1). The response window is collapsing on both ends.
Pre-AI vulnerability and exposure management programs can't keep up. That world ended.
Your scanner says the CVE is there. But is it actually exploitable in your environment, with your configuration, your deployment? Manual triage was already failing. The post-AI era made it undeniable.
An exploitable CVE matters because of the path it sits on. Where does an attacker enter? What does each hop grant? What's reachable downstream? That's the triage context for what to act on next. Analysts assembled this manually, tool by tool. That bottleneck is now untenable.
The risk isn't just the CVE: it's the config, the identity, the network on the path. Three categories of action across the path: reduce exposure, contain blast radius, improve monitoring. Execute at AI pace. Decisions stay with your team. Execution can't stay manual.