Accounts Payable Professionals Group

The practical hub for Accounts Payable work, careers, and community

Process improvement, controls, automation, vendor management, and career development, written for people doing the work.

Popular topics: AP automation, fraud controls, close process, vendor management, career moves | Learn what APPG is about →
AP News Update
NACHA fraud monitoring rule begins March 20, 2026. The first phase starts for ODFIs and large Originators, TPSPs, and TPSs, putting more focus on risk-based ACH fraud monitoring. For AP teams, vendor bank change controls and payment review processes matter even more now. Read the full APPG update → | Official NACHA summary →
Start here
Join the LinkedIn Group Newsletter Signup Browse AP Jobs
No spam. Just practical AP content.
Who this is for: Accounts Payable specialists, managers, directors, and finance leaders.

Saturday, April 11, 2026

Anthropic Mythos Ai Cyber Risk Banks AP

Skip to article body
Controls & Risk

Anthropic Mythos and the New AI Cyber Risk Facing Banks and Accounts Payable

Anthropic’s new Mythos model is raising serious concern in banking and cybersecurity circles. Here is what Accounts Payable professionals should understand, without the hype.

By Robert Ruhno
Executive Director, Accounts Payable Professionals Group
Updated: April 11, 2026 (Includes official sourcing, banking sector implications, and AP control considerations)
AI cyber risks impacting accounts payable workflows, banking systems, and payment infrastructure
Illustration: AI-driven cybersecurity risks across banking and Accounts Payable systems.

There are moments when technology improves gradually, and then there are moments when it changes the rules of the game.

This appears to be one of those moments.

Anthropic has introduced a new model called Claude Mythos Preview as part of its Project Glasswing initiative. According to Anthropic and its related security materials, Mythos is unusually capable at computer security tasks, including identifying serious software vulnerabilities. In internal testing, Anthropic indicated the model identified thousands of previously unknown vulnerabilities across widely used software systems, which is one reason the company is limiting access rather than releasing it broadly.

Anthropic says Glasswing launch partners include Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks.

That should matter to Accounts Payable professionals, because AP sits directly on top of the systems that move money.

Why this matters:
AP teams may not manage cybersecurity directly, but they depend on banking portals, ERP systems, payment integrations, browsers, cloud apps, vendor portals, and approval workflows. If those systems become easier to attack, AP becomes part of the blast radius.

What makes this different

Cyber threats are not new. Software vulnerabilities are not new. What appears to be changing is the speed, the scale, and the automation.

Traditionally, finding a major vulnerability required time, specialized expertise, and often a lot of patience. Exploiting one also required real technical skill.

AI changes that equation.

If a model can rapidly inspect code, reason through system behavior, identify weaknesses, and help generate exploit paths, the window between discovery and attack can shrink dramatically.

That is the real issue here. It is not just that vulnerabilities exist. It is that the time available to fix them may be getting shorter.

“This is not necessarily a panic-now event. But it is a real warning sign.”

Why banks are on alert

Reuters reported that Treasury Secretary Scott Bessent and Federal Reserve Chair Jerome Powell warned major bank CEOs about cybersecurity risks linked to Anthropic’s new model. That is a strong signal that this is being taken seriously at the highest levels of the financial system.

That makes sense.

Banking infrastructure depends on a shared technology stack that includes operating systems, browsers, cloud platforms, APIs, authentication layers, internal applications, and third-party software libraries. If powerful AI tools can uncover weaknesses across that stack faster than before, then both banks and the companies that rely on them need to pay close attention.

Where Accounts Payable fits into the picture

Accounts Payable is no longer just a back-office paperwork function.

In many organizations, AP now works through a connected ecosystem of systems and data flows.

That means AP is not just close to money. It is connected to the software layers through which money is approved, released, and recorded.

In practical terms, that makes AP a meaningful target area in any future wave of faster, AI-assisted cyberattacks.

What this could look like in the real world

Let’s bring this down to earth.

If vulnerabilities can be found and exploited faster, AP teams may feel the effect in very concrete ways:

1. Payment workflow compromise

A weakness in a browser session, plugin, or integration layer could potentially be used to interfere with payment approvals or session integrity.

2. Vendor portal manipulation

If a supplier portal has a serious flaw, vendor information could be altered, hidden, or rerouted in ways that standard controls may not immediately catch.

3. API-level risk

Many AP environments rely on integrations between ERP systems, banks, payment platforms, and approval tools. API connections can be efficient, but they also create technical paths that attackers may try to exploit.

4. Faster data theft

Vendor master data, invoice records, banking details, payment histories, and approval logs are all valuable. AI could make it easier for attackers to identify the weakest routes into those datasets.

5. More disruptive ransomware timing

Cybercriminals do not always need to shut down an entire company. They only need to interrupt the right systems at the right time, especially around payroll, month-end, quarter-end, or large payment runs.

What AP teams may notice soon

Most AP professionals are not going to log in one morning and see a message that says, “This happened because of Mythos.”

What you may see instead is:

  • More frequent software patches and security notices
  • New authentication requirements
  • Updated browser or endpoint security policies
  • Temporary downtime for banking or AP platforms
  • Stricter controls around vendor changes and payment releases
  • More questions from auditors, compliance teams, and insurers

In other words, even if the threat feels abstract, the operational consequences may become very concrete.

The good news

There is an important second side to this story.

The same AI capability that could make attacks faster can also help defenders find weaknesses sooner.

That is part of the logic behind Project Glasswing. Anthropic says the initiative is meant to help defenders secure critical software and gain a head start before comparable capabilities become more widespread.

If that effort works as intended, many organizations may benefit indirectly through faster remediation by software vendors, cloud providers, banks, and enterprise platforms.

So this is not a simple doom story. It is a race between defense and offense, and the pace is increasing.

What AP professionals should do right now
  • Do not ignore vendor security bulletins or platform update notices.
  • Review dual approval controls for higher-risk or higher-value payments.
  • Recheck vendor bank change procedures and callback discipline.
  • Limit and separate banking credentials wherever possible.
  • Watch for unusual workflow behavior, not just obvious fraud attempts.
  • Coordinate with IT or security teams if banking portals or AP tools suddenly change login or security behavior.
  • Document your controls, because audit and insurance scrutiny may increase.

Bottom line

This is not necessarily a panic-now event.

But it is a real warning sign.

AI appears to be crossing into a phase where it can materially accelerate both cybersecurity defense and cyber offense. For Accounts Payable, that means the systems behind invoices, approvals, vendor data, and payments are becoming more strategically important, and potentially more exposed.

AP professionals do not need to become cyber experts overnight. But they do need to understand that the old assumption, that security is somebody else’s problem until something breaks, is becoming more dangerous.

If your ERP, AP automation platform, bank portal, or payment workflow starts pushing security updates, stronger controls, or new access requirements in the coming weeks and months, pay attention.

That may be the earliest visible sign that this new phase has already begun.

Robert Ruhno
Executive Director
Accounts Payable Professionals Group
ap-professionals.com

Wednesday, April 8, 2026

Accounts Payable Fraud Prevention, Modern Risks

Fraud Is No Longer Breaking Your Process, It’s Using It

If a fraudulent payment left your organization today, would you know exactly how it happened?

Published on

Accounts Payable fraud prevention concept showing invoice and cybersecurity protection

Modern AP fraud often looks like ordinary business until the payment is gone.

If a fraudulent payment left your organization today, would you know exactly how it happened?

Or would you find yourself retracing steps, digging through emails, and trying to reconstruct a process that looked perfectly normal until the money was gone?

That question came up during a recent IOFM webinar on fraud-proofing Accounts Payable, and it stuck with me. Because it gets to the heart of what’s changed.

Fraud isn’t what it used to be.

It’s not sloppy emails. It’s not obvious red flags. It’s not the “Nigerian prince” anymore.

Today’s fraud is clean. Timed well. Often AI-assisted. And most importantly, it flows through your process instead of breaking it.

Data Snapshot

Recent fraud data helps explain why this issue feels so urgent right now.

  • AFP reported that 79% of organizations experienced attempted or actual payments fraud in 2024.
  • AFP also found that 63% of respondents identified business email compromise as the top avenue for fraud attempts.
  • FBI IC3 reported 21,442 BEC complaints in 2024, with adjusted losses above $2.7 billion.
  • FinCEN has continued warning about mail theft-related check fraud, reinforcing that paper checks still carry serious risk.

The Uncomfortable Truth About AP Fraud

Here’s the reality:

Most AP teams already have controls. Policies. Procedures. Approval workflows.

And yet, fraud is still getting through.

Why?

Because those controls were built for a different era.

Today, fraudsters don’t need to hack your systems. They just need to trick your people.

  • Impersonate vendors
  • Submit fake bank account change requests
  • Intercept emails
  • Send invoices that look almost identical to real ones

And they do it at exactly the right moment.

That’s the key. Timing.

Fraud today is not random. It’s strategic.

What This Looks Like in Real Life

A payment fraud attempt does not always arrive looking suspicious.

  • A vendor email arrives with “updated remittance instructions.”
  • The logo looks right, the tone sounds normal, and the invoice amount feels believable.
  • The timing creates pressure because the payment run is approaching.
  • Someone makes the change because it fits the normal workflow.
  • The process works exactly as designed, but the money goes to the wrong account.

That is why modern AP fraud is so dangerous. It often succeeds by looking routine.

Emerging 2026 Risks

Classic fraud tactics still matter, but the next layer is becoming harder to spot.

  • AI-generated invoices can look nearly perfect.
  • Voice cloning can make an urgent callback sound legitimate.
  • Synthetic vendor identities can be built to look real before a payment request is ever made.

The point is not to panic. The point is to stop assuming that “it looks normal” is enough.

Where AP Is Most Exposed

The biggest risks in AP are not always where we think.

1. Email
Email is still the backbone of AP communication. It is also one of the least secure channels.

2. Paper Checks
Checks remain one of the largest sources of fraud losses. They can be intercepted, altered, or stolen.

3. Manual Processes
Any process that depends on someone “just catching something” introduces risk.

4. Bank Account Changes
One of the fastest-growing fraud vectors, often still verified manually.

Why This Matters Now

This is also happening while the payments environment is tightening its expectations around fraud control.

Nacha’s fraud monitoring rule changes began Phase 1 on March 20, 2026, with broader Phase 2 implementation moving into practical effect on June 22, 2026. That does not solve AP fraud by itself, but it reinforces a larger point: payment risk management is becoming more structured, more visible, and harder to treat as an afterthought.

The Shift AP Needs to Make

The biggest takeaway is this:

Fraud prevention is no longer about being more careful.

It’s about being more structured.

1. Train Continuously, Not Once

Fraud evolves constantly. Training must be ongoing, practical, and relevant.

2. Reduce Trust, Increase Verification

Every change, especially bank account updates, should be independently verified.

3. Automate Where It Matters

Automation is not just about efficiency. It strengthens control.

  • Flag unusual invoice patterns
  • Detect duplicate submissions
  • Identify abnormal payment amounts
  • Spot invoice amounts just below approval thresholds
  • Surface suspicious vendor address or account changes
  • Support stronger audit trails and cleaner approval workflows

4. Move Away from Paper

Electronic payments significantly reduce fraud exposure.

Virtual cards are especially effective because they are:

  • Single-use
  • Amount-specific
  • Vendor-specific

That does not mean every supplier will accept them. But it does mean AP leaders should be looking harder at where checks still remain and asking whether those payment types are creating avoidable exposure.

AP Fraud Pressure Test

If you want a quick gut check, start here:

  • Are vendor bank changes independently verified outside email?
  • Are paper checks limited and protected by positive pay?
  • Are unusual or duplicate invoices automatically flagged?
  • Are approval and payment functions separated?
  • Are approval thresholds reviewed for manipulation risk?
  • Are vendor master file changes restricted and logged?
  • Is fraud training recurring instead of one-time?
  • Is there a written response plan for suspected payment fraud?

If several of those answers are “no,” your AP process may be relying more on trust than structure.

Final Thought

Accounts Payable is no longer just a processing function.

It is a control function.

It sits at the intersection of cash, vendors, and execution, which makes it one of the most targeted areas in any organization.

And while external fraud gets most of the attention, strong process design also helps reduce the risk of internal manipulation, collusion, and control override.

The companies that recognize this shift will adapt.

The ones that don’t will eventually learn the hard way.

Questions for AP Leaders

Now I’d like to hear from you:

What do you believe is the single biggest fraud risk in your AP process right now?

And if a suspicious payment request landed in your inbox today, would your current process catch it, or would it let it pass through?


Headshot of Robert Ruhno, Executive Director of APPG
Robert Ruhno
Executive Director
APPG
AP Professionals logo
🟥 LinkedIn
🟧 X
🟨 Instagram

Back to top ↑

More on this topic:

Accounts Payable Office Health Risks

Skip to main content Workplace Health and Accounts Payable Accounts Payable and the Modern Office: The Health Ri...