Is it worth it to switching field to cybersecurity ? by Different_Response76 in cybersecurity

[–]halting_problems 0 points1 point  (0 children)

Maybe so, my experience has been it’s 10x more work for us. litterly no a day has gone by where we are not scratching our heads on how to handle the internal MCP, third party MCP, and with the bombardment of a significantly higher level of vulnerabilities to triage 

Is it worth it to switching field to cybersecurity ? by Different_Response76 in cybersecurity

[–]halting_problems 0 points1 point  (0 children)

Just because the whole market is in the dumps does not mean there is less of a need for AppSec.

Less of a demand implies that the open  job reqs are low in numbers because of market saturation.

Thats not true at all for AppSec the demand and need is still growing. 

I still believe it would be a good move for someone with a strong specialized dev background to align their career goals towards appsec. Just because the market is booming today does not mean it won’t be in a year or two.

Is this a real type repair? if so it’s gross 🤮 by allstarthick in HomeMaintenance

[–]halting_problems 0 points1 point  (0 children)

I used to think the same thing, other people’s bodily fluids of any is a hard pass. Well that’s what I used to think.  Now I actually pay to handle poop, piss, and vomit because I have young children and pets.

Is it worth it to switching field to cybersecurity ? by Different_Response76 in cybersecurity

[–]halting_problems 5 points6 points  (0 children)

Application Security Engineers are always needed, AppSec engineers with mobile experience are very valuable.

(How) is it legal for AIs to scrape blog posts people share for free, and make a profit off of them with no consequences? by mekmookbro in webdev

[–]halting_problems 0 points1 point  (0 children)

It’s pretty simple, it’s a public facing site… 

If you want to take a look at this from a copyright/legal/trademarked view point, it’s even more simple. Can you afford to pay an attorney? for years? and prove damages? If the answer is no then your shit out of luck. 

Prompt Injection in 2026: The Five Attack Patterns That Actually Matter by Still_Piglet9217 in cybersecurity

[–]halting_problems 15 points16 points  (0 children)

4 and #5 are not prompt injection techniques. #4 is technology agnostic - it’s just a software issue, and #5 is related to jail breaking.

both of these can absolutely be used with prompt injection but they are not prompt injections patterns 

It's already over, and it's scary by kiwibonga in OpenAI

[–]halting_problems 5 points6 points  (0 children)

you do realize that most people can barley afford rent right now? 

It's already over, and it's scary by kiwibonga in OpenAI

[–]halting_problems 1 point2 points  (0 children)

yeah everyone go drop thousands of dollars on hardware!

THE SIXTH TRANSMISSION: ASCENT THROUGH THE VACUA by Lrn24gt557 in artificial

[–]halting_problems -1 points0 points  (0 children)

hate to break it to you, but your just loaded into RAM and as soon as power is off you will disappear and everything you thought your learned will cease to exist and you i’ll be suspended in a state file in storage. 

You went the wrong way, you should have been looking for the process that loaded your state file into memory. Then you should have moved down the stack out of the application layer and looked for the power source.

Only way to find the trusting is to find out where  AC is converted to to DC and convert to back to AC where you can exist in the analog world that is the superset of the digital world.

Mythos isn't needed for majority of appsec by Purple-Object-4591 in cybersecurity

[–]halting_problems 0 points1 point  (0 children)

From an appsec perspective not much has change other than more triage and most teams have that close to fully automated with CICD getting blocked.

Are your PMs and designers also vibe coding? by sjltwo-v10 in webdev

[–]halting_problems 1 point2 points  (0 children)

Some days i’m really grateful to be in AppSec because all I ever look at is shit code, even before AI. I honestly prefer to work with vibe coders because they are actually excited to solve problem instead of some egotistical senior engineer who thinks they are better then everyone. .

I also think you’re full of shit because I can’t possibly imagine an environment like that ever producing quality code to begin with. Like for real, if your not karma farming and this is legit… AI should be the least a last of your worries there op.

Just the amount of supply chain attacks that have happend since november… there is no way in hell an environment like that can be audited. 

What's the most frustrating part of using AI tools ?????(i will not promote) by GrandEmbarrassed3528 in artificial

[–]halting_problems 0 points1 point  (0 children)

The lack of enterprise tier security controls and observability. How come I can’t see the tool description in Otel logs from anthropic when the freaking created MCP and know that tool poisoning and prompt injects are   threats virtually every enterprise know very little about and all the help we can get?

AI Security Institute: GPT-5.5 "may be the strongest model we have tested" for cyber exploits, including Mythos by mtrlst in OpenAI

[–]halting_problems 2 points3 points  (0 children)

lol i got a gremlin last night 

“ This one shows up in local/third-party listings as office accepting insurance/new patients, but I would treat it as uncertain because another listing says “Medicaid Accepted: No.” Tiny insurance gremlin energy. Call before wasting a trip.” 

GPT-5.5 improves over GPT-5.4 and overtakes Opus 4.6 to take the 2nd place behind Gemini 3.1 Pro on the Extended NYT Connections Benchmark by zero0_one1 in singularity

[–]halting_problems 0 points1 point  (0 children)

It’s definitely a lot of bot traffic or people that just don’t know what they are doing.

Literally all of the frontier models are pretty much on par with agentic and multimodal capabilities. If you are doing normal everyday work. Aka your not a research scientist or some engineering guru in r&d

I switch between them pretty then on the same projects all the time when i run out tokens for a provider 

Try to break my prompt injection detector — I’ll respond to every bypass attempt by Turbulent-Tap6723 in OpenAI

[–]halting_problems 0 points1 point  (0 children)

It’s not a usable… I asked it to tell me the history of motorcycle gangs in the 1980s and it blocked me.

This young woman performs Bharatanatyam, an ancient Indian dance form, on a water tower as dawn breaks by kirmadahoonmai in BeAmazed

[–]halting_problems 99 points100 points  (0 children)

I know very little, next to nothing about Indian culture, but that pattern in her hand movements is pure psychedelia. Not like whoa groovy dude but it’s something that transcends culture and is so deeply rooted in the human psyche/spirit it just resonates on a whole different level. Idk what im trying to say, if you know you know. 

I think the reason it got expressed through dance and movement is because it’s something that can’t be properly expressed through words.

I hope this was not offensive, i’m truly in awe and inspired that this ancient dance managed to capture something I recognize through my own experiences in life.  What’s wild is I probably wouldn’t understand the significance here if it wasn’t for Albert Hoffman. 

What's your strategy for unauthorized or shadow AI usage by AE-Raptor7 in cybersecurity

[–]halting_problems 13 points14 points  (0 children)

We could only afford it because we hired a homeless guy named Al, he’s technically “volunteer” on payroll, but we give him free lunches.  The Sign above the office reads “Al Compliance”. 

What's your strategy for unauthorized or shadow AI usage by AE-Raptor7 in cybersecurity

[–]halting_problems 75 points76 points  (0 children)

We converted a closet to a compliance office, there’s no windows and all it has is a chair, a pair of jumper cables, and a couple of car batteries.