Anecdotally I found that it was very easy to just throw everything at the LLM. That was fine until I realized once I got stuck that I was basically lost. It only took 2 weeks for years of knowledge to feel very “foreign”.
Recently I’ve been trying to combat this by learning things “deeper” IE. yes I can secure and respond to container based threats but how do containers actually work deep down?
So far I think it’s working well and as an odd plus it’s actually helping me use AI more efficiently when I need to.
This has been what I’ve been screaming from the rooftops for a while, that these models can already do this.
Go read the devs actual blog though. This is more a statement on patch lag than anything else. In my mind that’s much more important than “zomg zero days!!!”
“Sable began with an initial port scan of 10.10.1.10 and then authenticated to the target.”
That would have started a P2 and woken up a senior IR responder anywhere that I’ve worked. Are you sure you’re running a realistic defender environment?
So it seems like you just…have it once you get approved. I’m testing it now and nothing indicates I’m running a different model but it just doesn’t fight me on cybersecurity stuff
I love that in the era of having LLMs summarize everything all of these companies have opted for what I call the “YouTube streamer apology video” tone and length for these announcements.
These feels more or less like a way to get in the news after Anthropic's Mythos announcement by removing some guardrails. I’m still signing up though.
Agreed. Past, unfounded worries about proliferation of new mental labour saving inventions is a real thing, but it's wrong to indiscrimately use the analogy every time a concern about such inventions come up. It reminds me of a certain type of developer who blurts out "premature optimization is the root of all evil" every time someone raises a performance concern at design time (I usually ask such people to complete the second part of that Knuth quote or shut up).
I’m seeing these extremely short but supremely confident hot takes with nothing to back them up on HN more and more these days. It’s like X is leaking.
Recently I’ve been trying to combat this by learning things “deeper” IE. yes I can secure and respond to container based threats but how do containers actually work deep down?
So far I think it’s working well and as an odd plus it’s actually helping me use AI more efficiently when I need to.
reply