This is the foundation of modern exploitation: buffer overflows, use-after-free, ROP chains, ASLR bypass, and the delicate art of shellcode and privilege escalation. Weâve been told that AI is coming for the security researcherâthat the Claude Mythos or some other LLM will perform a clean sweep of open-source vulnerabilities and leave us with a solved problem.
Don't buy it.
Cybersecurity will be more important than ever in a world of AI. The current state of things is a massive mess that no model can fix with a code review. We are creating more vulnerabilities than we are solving. Phishing and social engineering have never worked better, and supply chains are an absolute, unmitigated disaster. When you give AI agents access to CLIs and free rein, they don't solve the problem; they just automate the chaos.
The Patch Gap vs. The Detection Gap
Most companies still don't take cybersecurity seriously. We are entering a time where exploiting vulnerabilities is easier than ever, making organizations more vulnerable than they've ever been. Shit stays unpatched even when the fix has been available for yearsâout-of-support dependencies are woven into the very revenue fabric of the applications.
In practice, your biggest exposure isn't the vulnerability itself; it's the six-week gap between public disclosure and enterprise-wide patching. Attackers weaponize within hours. If there's no official Microsoft fix to cite in a change-management ticket, the patch doesn't happen. The detection gap, not the patch gap, is what actually kills you.
We need more gatekeeping in this field, not less. There is too much incompetence slipping through the cracks for a paycheck. If we had the same rigor as doctors or lawyers, the quality of the workforce would match the stakes of the threat.