Safepay
You must login to view this content
You must login to view this content
You must login to view this content
You must login to view this content
Cryptocurrency exchanges are intensifying security measures in 2025 to focus on preventing phishing attacks, as these scams reach alarming levels and have caused millions in losses for investors. As digital assets continue gaining mainstream adoption, cybercriminals deploy increasingly sophisticated techniques to compromise exchange accounts and steal funds. While exchanges implement advanced security features, experts emphasize […]
The post Preventing Phishing Attacks on Cryptocurrency Exchanges appeared first on Cyber Security News.
Bitter Lesson, an essay by one of the creators of reinforcement learning, first published back in 2019, recently made the rounds again now that its author, Professor Richard Sutton, was named a winner of this year’s ACM Turing Award. In it, he points out that general methods have won, again and again, beating out domain-specific human expertise.
As pointed out in the essay, available on his blog here: http://www.incompleteideas.net/IncIdeas/BitterLesson.html, experts with deep domain understanding have had to learn that their expertise can become an impediment to progress.
This is a bitter lesson indeed.
He walks through well-known examples. In chess, Go, and natural language, raw compute plus a flexible learning architecture has far surpassed hand-crafted heuristics and feature engineering.
I highly recommend the original essay. It had a similar impact on me as when I read Kuhn’s Theory of Scientific Knowledge, a book whose perspective was applied and popularized by Christensen’s The Innovator’s Dilemma years later. And Kuhn’s work of course, was itself a popularization of Hegel, who spawned a number of other impactful thinkers, but I definitely digress.
In this short blog I consider why cybersecurity has been slow to learn the bitter lesson. I am fairly well placed to answer this, as a founder of one of the few cybersecurity companies building and applying deep learning foundation models in cybersecurity.
Here are a few theories:
1. the Human Log Readers that Founded CyberCybersecurity’s founders have spent decades learning every nuance of protocol quirks and attacker TTPs (tactics, techniques, and procedures). Their understanding of indicators and signature patterns is unmatched and has delivered enormous ROI. Asking them to take a back seat to deep learning models is understandably asking a lot.
2. ML in Security earned a Bad RapEarly machine learning models would perform spectacularly in the lab, only to crumble over time as their environments changed. Maintenance overheads ballooned, and false positives flooded SOC teams. As a result, many organizations concluded that “ML” was too brittle for their ever-changing environments.
3. Exponentials are UnnaturalHumans don’t internalize exponentials well.
And today we face at least four simultaneous exponentials that have rapidly changed what is possible; it is extremely probable and completely understandable that long-time builders in cybersecurity would be behind in their understanding of what is possible.
Other arguments for why the bitter lesson has not been learned in cybersecurity include:
Does learning the Bitter Lesson mean tossing everything into a black-box LLM? No, or at least not yet. LLMs remain horrible at dealing with streams of logs. They offer promise in reading samples of logs and authoring explanations once an incident has been identified, but finding that incident from enormous streams of telemetry is well beyond their capabilities today.
But — purpose-built vertical foundation models are working across many domains. Netflix has published on their usage, as has Stripe, for example.
At DeepTempo, we have built an extremely accurate and adaptable LogLM, a foundation model pre-trained on massive volumes of logs. It doesn’t rely on handcrafted rules; instead, it learns normal behavior as a high-dimensional manifold, detecting deviations no human could foresee. When an attacker spins up a stealthy living-off-the-land C2 channel or deploys polymorphic malware, the LogLM flags subtle shifts in patterns, long before a signature, if one could be written, arrives. The model and our software then add quite a bit of context to that information. Leveraging the ground truth of flow logs, which are much harder to avoid than EDR, for example, our LogLM is adapting in minutes to new domains and showing 1% or lower false positive rates. Our foundation model LogLM powers our Tempo incident identification, available today for free for trial users on Snowflake as a NativeApp.
ConclusionResistance is futile. The Bitter Lesson will eventually solidify the failing foundation of cybersecurity. I believe that time is now, and our results with some of the largest cybersecurity users bear that out, while also keeping us humble and hungry. The adversary is innovating, and we must all up our game to catch up.
I would appreciate any conversation around the topic of why and when the bitter lesson will be learned in cybersecurity.
Cyber! Take your dadgum Medicine! was originally published in DeepTempo on Medium, where people are continuing the conversation by highlighting and responding to this story.
The post Cyber! Take your dadgum Medicine! appeared first on Security Boulevard.