Black Lantern Security (BLSOPS)

20 Followers
1 Following
37 Posts
By analyzing and simulating the most relevant attacks, Black Lantern Security delivers solutions that provide immediate reductions in organizational risk.

Our AI chatbot passed every prompt injection test we threw at it. Then we just asked it nicely for customer data, and it happily obliged.

New from our ASMOC team, how a vibe-coded website with LLM became a high-risk finding on a client's attack surface.

https://blog.blacklanternsecurity.com/p/artificial-foolishness-the-hidden

Artificial Foolishness: The Hidden Dangers of External-Facing LLMs

The rise of AI opens more doors to attackers

Black Lantern Security (BLSOPS)

🚀red-run 2.0 is live. Key updates:
Claude Code agent teams: each agent in its own tmux pane; hit Esc to pause or redirect in real time
New state-mgr teammate tracks findings and keeps the attack graph current
Still a lean, lab-focused CTF solver.

https://open.substack.com/pub/blacklanternsecurity/p/red-run-20-agent-teams?r=rbmdk&utm_campaign=post&utm_medium=web&showWelcomeOnShare=true

red-run 2.0: Agent Teams

A Claude Code Agent Dashboard

Black Lantern Security (BLSOPS)

We've made it to the last question of the month!

We'd like to know: Have you used BBOT's web modules such as spider or lightfuzz? Give us some feedback on those modules if you have.

Swag give-away next week!

Yes
0%
No
0%
Poll ended at .
From customer to admin takeover in one request—Amelia Booking Pro flaw enables full WordPress compromise. #CVE-2026-2931 is on the BLS Blog now!
https://blog.blacklanternsecurity.com/p/amelia-booking-pro-912-authenticated
Amelia Booking Pro ≤ 9.1.2: Authenticated Customer-to-Admin Password Reset via IDOR

CVE-2026-2931

Black Lantern Security (BLSOPS)
This week, we want to know: Were there any obstacles during your first experience with BBOT? If so, what were they?
We also want to share some swag with this month. We'll enter survey participants (one entry per question) into a drawing for a chance at some sweet BLS merch💜.
New post on the BLS Blog! Red Run walks through designing a compact native .NET loader that starts fast & keeps a low profile. The write-up covers inner workings & build steps.
Dive in: https://blog.blacklanternsecurity.com/p/red-run?r=qkvb8&utm_campaign=post&utm_medium=web&triedRedirect=true
red-run

All work and no tokens makes Claude a dull boy...

Black Lantern Security (BLSOPS)

It's time for the next question of our OSINT insight quest!

Q2: What is the single biggest missing feature you would like to see in BBOT?

Thx for sharing!

Over the next few weeks we're hoping to gain some insight from the novice & veteran users of subdomain enumeration / OSINT tools via polls.

Q1: What's your favorite OSINT tool?

If your favorite isn't listed, post feedback in the comments.

Thx for participating!

BBOT
100%
Amass
0%
subfinder
0%
theHarvester
0%
Poll ended at .
🚨CVE-2026-2103: Infor Syteline ERP hard-codes encryption keys in binaries. One copy = universal decryption of ALL passwords, DB creds & API keys across every install. No patch.
#CVE
https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp
CVE-2026-2103 - Infor Syteline ERP

Infor Syteline ERP

Black Lantern Security (BLSOPS)
Manspider 2.0 Release
New features include:
1) Better text extraction with Kreuzberg
2) Unit tests for stability
3) uv + ruff
4) Filtering on file modification time (thanks to https://github.com/probird5)
Install with: uv tool install man-spider
https://github.com/blacklanternsecurity/manspider