Two Emergent and Sophisticated Approaches to LLM Implementation in Cybersecurity