Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-01-15

Huntress Blog46 · 2026-01-15 15:00

SDFlags | Huntress

While investigating LDAP filters and attributes, I completely missed "SDFlags" in my Event 1644 logs. When I finally noticed it, the investigation led to nTSecurityDescriptor, attack path discovery, and a high-confidence detection signature.
OpenAI Blog29 · 2026-01-15 00:00

Strengthening the U.S. AI supply chain through domestic manufacturing

OpenAI launches a new RFP to strengthen the U.S. AI supply chain by accelerating domestic manufacturing, creating jobs, and scaling AI infrastructure.
OpenAI Blog24 · 2026-01-15 07:00

Investing in Merge Labs

OpenAI is investing in Merge Labs to support new brain computer interfaces that bridge biological and artificial intelligence to maximize human ability, agency, and experience.
Youssef Sammouda (sam0) personal blog17 · 2026-01-15 22:00

Multiple cross-site leaks disclosing Facebook users in third-party websites

Introduction This write-up consolidates several XS-Leak issues discovered across Meta-owned platforms, including Facebook, Workplace, Meta for Work, and internal Meta surfaces.
Mandiant | Transform Your Cybersecurity15 · 2026-01-15 16:00

From IOC to Action in Minutes: Unlocking Agentic Capabilities in Google Threat Intel

For modern security teams, the gap between detecting a suspicious indicator and fully understanding the threat is often measured in days—time that defenders simply don’t have. Manually correlating data, mapping TTPs, and authoring detection rules creates critical bottlenecks that slow down response and burn out analysts. Join Tim Gallo, Lead Global Solutions Architect, as he demonstrates how to shatter these bottlenecks using the new Agentic capabilities within Google Threat Intelligence. Tim...
Amit Merchant15 · 2026-01-15 00:00

Add UI sounds in your web apps in a heartbeat

I was reading the article Sounds on The Web by Raphael Salaja the other day. The article explains the importance of sounds in web applications and how integrating them just enough can dramatically enhance user experience by providing feedback and improving usability.
Trend Micro Simply Security10 · 2026-01-15 00:00

Introducing ÆSIR: Finding Zero-Day Vulnerabilities at the Speed of AI

TrendAI™’s ÆSIR platform combines AI automation with expert oversight to discover zero-day vulnerabilities in AI infrastructure – 21 CVEs across NVIDIA, Tencent, and MLflow since mid-2025.
ProjectDiscovery.io | Blog8 · 2026-01-15 13:01

Surfacing the real attack surface: Advances in asset discovery

Introduction Accurate external asset discovery remains a moving target for security teams at scale. What’s actually exposed is hard to pin down, regardless of how many inventories or spreadsheets an organization maintains. Release cycles move faster, new domains and endpoints are added constantly, and the attack surface continues to shift, leaving static processes and visibility tools struggling to keep up. Traditional discovery tools are effective at identifying well-known or easily indexed a
NOSEC 安全讯息平台 - 漏洞预警8 · 2026-01-15 11:03

【漏洞预警】Cal.com /api/auth/session 权限绕过漏洞(CVE...

漏洞名称:Cal.com /api/auth/session 权限绕过漏洞(CVE-2026-23478)风险等级:高危风险漏洞描述:Cal.co...
NOSEC 安全讯息平台 - 漏洞预警8 · 2026-01-15 03:21

【漏洞预警】Apache Struts XWork 组件 XML外部实体注入漏...

漏洞名称:Apache Struts XWork 组件 xm l外部实体注入漏洞(CVE-2025-68493)风险等级:中危风险漏洞描述...
[DRAGNET]5 · 2026-01-15 08:00

Multiple payloads deployed via c-ares DLL side-loading exploit

Multiple payloads deployed via c-ares DLL side-loading exploit    SC Media
[DRAGNET]5 · 2026-01-15 08:00

Global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target

Global ransomware attacks rose 32% in 2025, as manufacturers emerged as top target    Industrial Cyber
[DRAGNET]0 · 2026-01-15 08:00

DeadLock Ransomware: Smart Contracts for Malicious Purposes

DeadLock Ransomware: Smart Contracts for Malicious Purposes    Group-IB