Stacey Holleran

453 Followers
380 Following
491 Posts
Research & thought leadership comms at Rapid7. Hanging with the #infosec crew. Opinions expressed are mine unless they are yours too. Then they are ours.
#atl #dogmom #natureart #humanity #itstheguns
Rapid7 MDR is monitoring an increase in phishing campaigns via #MicrosoftTeams, wherein threat actors are impersonating internal IT departments then persuading users to grant remote access. https://www.rapid7.com/blog/post/dr-guidance-on-observed-microsoft-teams-phishing-campaigns/
Rapid7 Guidance on Observed Microsoft Teams Phishing Campaigns

The Rapid7 MDR team is currently monitoring an increase in phishing campaigns where threat actors (TAs) impersonate internal IT departments via Microsoft Teams. The primary objective is to persuade users to launch Quick Assist, granting the TA remote access to deploy malware, exfiltrate data, or facilitate lateral movement across the network.

Rapid7

New, by me: How AI Assistants are Moving the Security Goalposts

AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and novice code jockey.

Read more (and boost please!):

https://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/

#openclaw #AI #agentic #aiagents #lethaltrifecta

We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.

Who could possibly have foreseen this? Aside from anyone paying even the slightest bit of attention?

"One of the codebases…contained 2,675 distinct licensing conflicts, indicating the complexity of managing IP has grown exponentially…the mean number of vulnerabilities in code has nearly doubled since last year. Eighty-seven percent of the codebases had at least one vulnerability, 78% had high-risk vulnerabilities, and 44% had critical-risk vulnerabilities."

https://sdtimes.com/ai/report-open-source-licensing-conflicts-hit-an-all-time-high-as-organizations-struggle-to-audit-ai-generated-code-for-ip-risks/

#OpenSource

Report: Open source licensing conflicts hit an all-time high as organizations struggle to audit AI-generated code for IP risks

In a new report, Black Duck analyzed 947 commercial codebases and found that two-thirds of them had license conflicts.

SD Times
React2Shell, Critical unauthenticated RCE affecting React Server Components (CVE-2025-55182)

CVE-2025-55182 is a critical unauthenticated remote code execution vulnerability affecting React, a very popular library for building modern web applications.

Rapid7
TL;DR: 250 malicious documents is enough to backdoor LLMs of (almost) any size https://www.anthropic.com/research/small-samples-poison?utm_source=tldrinfosec
A small number of samples can poison LLMs of any size

Anthropic research on data-poisoning attacks in large language models

Hacking group claims theft of 1 billion records from Salesforce customer databases | TechCrunch

The hacking group claims to have stolen about a billion records from companies, including FedEx, Qantas, and TransUnion, who store their customer and company data in Salesforce.

TechCrunch
Worries mount over max-severity GoAnywhere defect

Forta, the vendor behind the file-transfer service software, has yet to report exploitation or address evidence of compromise. Independent researchers say otherwise.

CyberScoop

Well, it somehow got even worse.

After taking a look at the Neon app, I found a major security flaw that allowed any logged-in user to access the phone numbers, call recordings, and transcripts of any other user.

I alerted the company's founder, Alex Kiam, to the security lapse, and he pulled Neon offline soon after.

https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/

Exclusive: Neon takes down app after exposing users' phone numbers, call recordings, and transcripts

Call recording app Neon was one of the top-ranked iPhone apps, but was pulled offline after a security bug allowed any logged-in user to access the call recordings and transcripts of any other user.

TechCrunch
LOAD-BEARING STICKER DO NOT REMOVE