Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-01-13

Trail of Bits50 · 2026-01-13 12:00

Lack of isolation in agentic browsers resurfaces old vulnerabilities

With browser-embedded AI agents, we’re essentially starting the security journey over again. We exploited a lack of isolation mechanisms in multiple agentic browsers to perform attacks ranging from the dissemination of false information to cross-site data leaks. These attacks, which are functionally similar to cross-site scripting (XSS) and cross-site request forgery (CSRF), resurface decades-old patterns of vulnerabilities that the web security community spent years building effective defens...
Huntress Blog46 · 2026-01-13 06:00

Cross-Platform Unity in EDR

Huntress researchers weigh in on the challenge of getting feature parity across Windows, macOS, and Linux. And learn how unique security models and platform maturity shape the way products are built.
SentinelOne Labs41 · 2026-01-13 13:58

Inside the LLM | Understanding AI & the Mechanics of Modern Attacks

Learn how attackers exploit tokenization, embeddings and LLM attention mechanisms to bypass LLM security filters and hijack model behavior.
Trend Micro Simply Security37 · 2026-01-13 00:00

Key Insights on SHADOW-AETHER-015 and Earth Preta from the 2025 MITRE ATT&CK Evaluation with TrendAI Vision One™

This blog discusses notable modern TTPs observed from SHADOW-AETHER-015 and Earth Preta, from TrendAI Research™ monitoring and TrendAI Vision One™ intelligence. These findings support the performance of TrendAI™ in the 2025 MITRE ATT&CK Evaluations.
OpenAI Blog27 · 2026-01-13 16:00

Zenken boosts a lean sales team with ChatGPT Enterprise

By rolling out ChatGPT Enterprise company-wide, Zenken has boosted sales performance, cut preparation time, and increased proposal success rates. AI-supported workflows are helping a lean team deliver more personalized, effective customer engagement.
Sucuri Blog17 · 2026-01-13 23:48

Malware Intercepts Googlebot via IP-Verified Conditional Logic

Some attackers are increasingly moving away from simple redirects in favor of more “selective” methods of payload delivery. This approach filters out regular human visitors, allowing attackers to serve malicious content to search engine crawlers while remaining invisible to the website owner. What did we find? During a malware investigation, we identified a selective content injection attack inside the main index.php file of a WordPress website. Instead of always loading WordPress normally, t...
Bruce's Blog17 · 2026-01-13 11:00

Claude Cowork: Anthropic Desktop AI Agent That Controls Your Files

Claude Cowork is a research preview desktop AI agent that directly accesses local files, runs code in sandboxed environments, and integrates with Notion, Linear, and GitHub via MCP. Currently macOS only.
VentureBeat AI8 · 2026-01-13 13:00

Salesforce rolls out new Slackbot AI agent as it battles Microsoft and Google in workplace AI

Salesforce on Tuesday launched an entirely rebuilt version of Slackbot , the company's workplace assistant, transforming it from a simple notification tool into what executives describe as a fully powered AI agent capable of searching enterprise data, drafting documents, and taking action on behalf of employees. The new Slackbot, now generally available to Business+ and Enterprise+ customers, is Salesforce's most aggressive move yet to position Slack at the center of the emerging "agentic AI"...
We Live Security » Languages » English8 · 2026-01-13 10:00

Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Gusto8 · 2026-01-13 00:20

How to Write an Oscar-Worthy LLM Prompt: Your Guide to the Prompt-Chaining Framework

How to Write an Oscar-Worthy LLM Prompt: Your Guide to the Prompt-Chaining Framework