While the world is in "awe" of how Mythos can find vulnerabilities and chain together exploits, the next step is to identify ...