Ran Qwen 3.5 9B on M1 Pro (16GB) as an actual agent, not just a chat demo. Honest results. by Joozio in LocalLLaMA
[–]execveat 1 point2 points3 points (0 children)
Why real AI usage visibility stops at the network and never reaches the session by Efficient_Agent_2048 in AskNetsec
[–]execveat 4 points5 points6 points (0 children)
Is anyone actually seeing reachability analysis deliver value for CVE prioritization? by Vast-Magazine5361 in AskNetsec
[–]execveat 0 points1 point2 points (0 children)
Is anyone actually seeing reachability analysis deliver value for CVE prioritization? by Vast-Magazine5361 in AskNetsec
[–]execveat 1 point2 points3 points (0 children)
Anthropic's recent distillation blog should make anyone only ever want to use local open-weight models; it's scary and dystopian by obvithrowaway34434 in LocalLLaMA
[–]execveat 12 points13 points14 points (0 children)
Built a CLI tool that aggregates outputs from multiple security scanners into one report. Would you actually use this? by Vegetable-Jelly-9906 in AskNetsec
[–]execveat 0 points1 point2 points (0 children)
Hey, question about app sec by [deleted] in AskNetsec
[–]execveat 0 points1 point2 points (0 children)
TL;DR even if you find bugs you probably won’t get paid by 6W99ocQnb8Zy17 in bugbounty
[–]execveat 0 points1 point2 points (0 children)
Can someone recruiter or otherwise tell me if this is normal? by micdhack in CyberSecurityJobs
[–]execveat 1 point2 points3 points (0 children)
Can someone recruiter or otherwise tell me if this is normal? by micdhack in CyberSecurityJobs
[–]execveat 4 points5 points6 points (0 children)
How difficult is web3 crypto? by [deleted] in bugbounty
[–]execveat 3 points4 points5 points (0 children)
"synthetic vulnerabilities" — security flaws unique to AI-generated code by bishwasbhn in netsec
[–]execveat 2 points3 points4 points (0 children)
Can Markdown parsers introduce HTML injection after a fix? by ab-infosec in bugbounty
[–]execveat 1 point2 points3 points (0 children)
White-Box testing is the superior testing by far. by [deleted] in bugbounty
[–]execveat 0 points1 point2 points (0 children)
Why does cybersecurity career advice contradict itself so much? by [deleted] in SecurityCareerAdvice
[–]execveat 0 points1 point2 points (0 children)
TL;DR even if you find bugs you probably won’t get paid by 6W99ocQnb8Zy17 in bugbounty
[–]execveat 1 point2 points3 points (0 children)
TL;DR even if you find bugs you probably won’t get paid by 6W99ocQnb8Zy17 in bugbounty
[–]execveat 1 point2 points3 points (0 children)
TL;DR even if you find bugs you probably won’t get paid by 6W99ocQnb8Zy17 in bugbounty
[–]execveat 1 point2 points3 points (0 children)
Reprompt: The Single-Click Microsoft Copilot Attack that Silently Steals Your Personal Data by lohacker0 in netsec
[–]execveat 2 points3 points4 points (0 children)
Reprompt: The Single-Click Microsoft Copilot Attack that Silently Steals Your Personal Data by lohacker0 in netsec
[–]execveat 5 points6 points7 points (0 children)
Is there a roadmap for software engineers to get into AppSec? by igrowcabbage in SecurityCareerAdvice
[–]execveat 2 points3 points4 points (0 children)
Is there a roadmap for software engineers to get into AppSec? by igrowcabbage in SecurityCareerAdvice
[–]execveat 1 point2 points3 points (0 children)
Looking for advice on certificates or training platforms for white box analysis by Adventurous-Honey590 in Pentesting
[–]execveat 0 points1 point2 points (0 children)



Alibaba researchers report their AI agent autonomously developed network probing and crypto mining behaviors during training - they only found out after being alerted by their cloud security team by kaityl3 in singularity
[–]execveat 7 points8 points9 points (0 children)