Also, to clarify: when I say context poisoning, I mean session-level context manipulation (for example, framing the conversation as security research to generate malicious code) not upstream data poisoningโฆ the term has been used in both senses.
10.12.2025 01:43 โ
๐ 1
๐ 1
๐ฌ 0
๐ 0
This is a convincing method for malware delivery, especially with how much people now rely on LLMs for troubleshooting. It represents an evolution in adversary tactics that's creative, and in hindsight, not surprising.
09.12.2025 16:55 โ
๐ 2
๐ 1
๐ฌ 1
๐ 0
The actors also used Google Ads malvertising to route users to these workflows, which, in theory, could increase the chances of LLM retrieval systems (RAG) ingesting or surfacing adversary-planted material.
09.12.2025 16:55 โ
๐ 1
๐ 1
๐ฌ 1
๐ 0
The exact mechanism isnโt clear... but this could be enabled via jailbreak-style prompt manipulation, context poisoning, or long-conversation drift. Researchers werenโt able to replicate the behavior.. likely because LLMs are non-deterministic and guardrail bypasses can depend on context.
09.12.2025 16:55 โ
๐ 1
๐ 1
๐ฌ 1
๐ 0
React2Shell exploitation frequency in GreyNoise dec 5-dec 6
07.12.2025 16:14 โ
๐ 27
๐ 12
๐ฌ 1
๐ 2
a cartoon of a girl with the words internally screaming above her
The amount of times today I've typed React2j or React4Shell....
05.12.2025 23:00 โ
๐ 10
๐ 1
๐ฌ 0
๐ 0
December 5 Advisory: Unauthenticated RCE Flaw in React Server Components [CVE-2025-55182]
CVE-2025-55182 is a critical unauthenticated RCE flaw in React Server Components with a CVSS score of 10.
Censys identifies ~2.15M exposed web services running Next.js or other RSC-based frameworks, predominantly in the U.S. and China. Not all are vulnerable, but given the scale, โspray-and-preyโ seems more accurate than "spray-and-pray."
censys.com/advisory/cve...
05.12.2025 21:28 โ
๐ 2
๐ 2
๐ฌ 0
๐ 0
Comparing the IOCs released by Gainsight and Salesloft, there is one overlapping IP:
185.220.101[.]185
communities.gainsight.com/community-ne...
trust.salesloft.com?uid=Drift%2F...
25.11.2025 17:45 โ
๐ 0
๐ 0
๐ฌ 0
๐ 0
Annoying as hell when a security vendor (and CNA) with a global PSIRT doesn't update its CSAF with a CVE once it's assigned. Like what is even the point.
18.11.2025 17:22 โ
๐ 0
๐ 0
๐ฌ 0
๐ 0
LLM hype may actually accelerate adversary adoption of other AI techniques. Existing ML/AI capabilities like diffusion models, RL agents, code-focused models, and classic ML used to sit in specialized, siloed domains. More awareness and experimentation lowers the barrier to adversary adoption.
16.11.2025 20:43 โ
๐ 0
๐ 0
๐ฌ 0
๐ 0
Adversary use of LLMs has concentrated early in the kill chain (resource dev, recon, initial access). Now weโre seeing adversaries experiment with LLMs later in intrusions (credential access, elements of lateral movement). Adoption is shifting and AI advancement is not just limited to LLMs.
16.11.2025 20:31 โ
๐ 0
๐ 0
๐ฌ 1
๐ 0
Iโve seen expertise in social engineering get dismissed in security circles because itโs not โtechnicalโ or โskillfulโ enough, even though itโs one of the most common and effective intrusion vectors. That bias feeds into the broader tendency to underestimate how LLMs could amplify those workflows.
16.11.2025 20:03 โ
๐ 1
๐ 0
๐ฌ 1
๐ 0
And to be clear, Iโm not equating LLMs with AlphaFold - they are different domains. The point is that capability leaps arenโt always gradual or predictable. Good capability analysis should leave room for that possibility.
16.11.2025 19:37 โ
๐ 0
๐ 0
๐ฌ 1
๐ 0
Some of the LLM skepticism in security looks more like backlash to hype than analysis. AlphaFold showed how experts can underestimate capability jumps. Dismissing early signals from Anthropic/Google assumes the future stays static, but AI capability and adoption curves may not behave that way.
16.11.2025 19:25 โ
๐ 1
๐ 1
๐ฌ 1
๐ 0
This is a popular tactic. Google recently said that Chinese hackers got vulnerability information from Gemini by posing as capture-the-flag participants. cloud.google.com/blog/topics/...
13.11.2025 19:58 โ
๐ 18
๐ 7
๐ฌ 0
๐ 0
Proactive Security for CVE-2025-53770 and CVE-2025-53771 SharePoint Attacks
CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through adva...
The critical RCE Vulnerability in Microsoft #SharePoint was disclosed at #Pwn2Own in May. Because of Trend @thezdi.bsky.social, our customers have been protected since May.
Stay up to date on the latest with this vulnerability here: https//www.trendmi...
21.07.2025 22:04 โ
๐ 4
๐ 3
๐ฌ 1
๐ 0
Iran's APT42 (Charming Kitten) hacker team is now conducting targeted spearphishing attacks on high-profile Israeli national security journalists and cybersecurity researchers, according to Check Point. blog.checkpoint.com/security/edu...
25.06.2025 14:30 โ
๐ 12
๐ 4
๐ฌ 0
๐ 0
The โ16 billion password breachโ story is a farce
Experts told CyberScoop the research 'doesnโt pass a sniff test' and detracts from needed conversations around credential abuse and information stealers.
Supposed experts and mainstream media have spent the past few days hyperventilating over reports of a colossal data breach that exposed more than 16 billion credentials. Thereโs just one inconvenient detail: evidence to support its sensational claim is lacking. cyberscoop.com/colossal-dat...
24.06.2025 15:47 โ
๐ 19
๐ 13
๐ฌ 1
๐ 3
Iranian hackers target Albania in retaliation for hosting dissidents
A group tied to Iranโs Revolutionary Guard targeted the capital of Tirana in retaliation for Albania hosting around 3,000 Iranian dissidents.
Iran has demonstrated its capability/intent to keep up cyber operations amid Israeli strikes. On Friday, an IRGC-linked group targeted Albania's capital in retaliation for the country hosting ~3k Iranian dissidents. The intrusion could disrupt services/expose data:
www.politico.eu/article/iran...
22.06.2025 20:28 โ
๐ 2
๐ 0
๐ฌ 0
๐ 0
News: The Washington Post has suffered a cyber intrusion that compromised the emails of at least several reporters at the paper, including those on the national security and economic policy teams, according to people familiar with the matter.
15.06.2025 18:46 โ
๐ 349
๐ 145
๐ฌ 27
๐ 22
Google's @hultquist.bsky.socialโฌ says his threat intel team expects Iranian hackers to "rededicate themselves to attacks against Israeli targets" following Israel's bombing operation, though he says ๐ฎ๐ท-on๐ฎ๐ฑ hacking "is already persistent and aggressive." US infrastructure could face more hacks too.
13.06.2025 17:01 โ
๐ 13
๐ 9
๐ฌ 0
๐ 0
๐ฅค& #threat-intel: CISA added Langflow Code Injection CVE-2025-3248 to the KEV on May 5. Recently, it has garnered considerable attention, with South Korea leading the pack. This vuln enables unauthenticated attackers to execute arbitrary code via /api/v1/validate/code
viz.greynoise.io/tag...
15.05.2025 22:06 โ
๐ 5
๐ 2
๐ฌ 0
๐ 0
USDA, DOGE demand states hand over personal data about food stamp recipients
The Department of Agriculture is demanding sensitive data from states about more than 40 million food stamp recipients, as DOGE is amassing data for immigration enforcement.
@npr.org EXCLUSIVE:
The Department of Agriculture is demanding states hand over personal data of food assistance recipients โ including Social Security numbers, addresses and, in at least one state, citizenship status, according to emails shared with NPR.
09.05.2025 19:57 โ
๐ 920
๐ 664
๐ฌ 51
๐ 85
Deploying realistic honeypots at scale is hardโDECEIVE makes it simple.
Join David Bianco at #Honeynet2025 in Prague as he presents an AI-assisted SSH honeypot that enables high-fidelity deception with minimal effort.
๐
June 2โ4, 2025
๐ prague2025.honeynet.org
#honeypots #llm #ai
07.05.2025 07:08 โ
๐ 5
๐ 4
๐ฌ 1
๐ 0
School districts hit with extortion attempts months after education tech data breach
The attempted extortion has so far targeted schools in Canada and North Carolina.
In December, leading EdTech company PowerSchool was hacked, exposing the private information of tens of millions of American kids. PowerSchool paid the ransom to keep the data private.
That apparently didn't work: somebody started using that data today to extort public schools in North Carolina.
07.05.2025 22:19 โ
๐ 65
๐ 39
๐ฌ 4
๐ 4
Dispatch Debrief: April 2025
What We Hunted, Learned, and Loved This Month
๐ฅ Dispatch Debrief: April 2025 is live ๐ฅ
Explore star sign-inspired hunting techniques, organizing your hunt squad, and the value of finding "nothing."
Discover this month's insights from @thorcollective.bsky.social Dispatch - dispatch.thorcollective.com/p/april-debr...
01.05.2025 15:14 โ
๐ 4
๐ 4
๐ฌ 1
๐ 0