Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-01-22

NOSEC 安全讯息平台 - 漏洞预警60 · 2026-01-22 06:23

【漏洞预警】GNU InetUtils Telnetd USER环境变量注入 权限...

漏洞名称:GNU InetUtils Telnetd USER环境变量注入 权限绕过漏洞(CVE-2026-24061)风险等级:高危风险漏...
Huntress Blog40 · 2026-01-22 15:00

Huntress Catches SmarterMail Account Takeover Leading to RCE

SmarterMail versions prior to Build 9511 are vulnerable to privileged account takeover and remote code execution. Learn more about the latest Huntress DE&TH Team’s findings.
OpenAI Blog38 · 2026-01-22 00:00

Inside Praktika's conversational approach to language learning

How Praktika uses GPT-4.1 and GPT-5.2 to build adaptive AI tutors that personalize lessons, track progress, and help learners achieve real-world language fluency
Trend Micro Simply Security29 · 2026-01-22 00:00

Watering Hole Attack Targets EmEditor Users with Information-Stealing Malware

TrendAI™ Research provides a technical analysis of a compromised EmEditor installer used to deliver multistage malware that performs a range of malicious actions.
OpenAI Blog27 · 2026-01-22 12:00

Scaling PostgreSQL to power 800 million ChatGPT users

An inside look at how OpenAI scaled PostgreSQL to millions of queries per second using replicas, caching, rate limiting, and workload isolation.
OpenAI Blog27 · 2026-01-22 00:00

Inside GPT-5 for Work: How Businesses Use GPT-5

A data-driven report on how workers across industries use ChatGPT—covering adoption trends, top tasks, departmental patterns, and the future of AI at work.
Darren Martyn17 · 2026-01-22 06:34

Cybersecurity and Compliance: Assessing the Digital Integrity of France’s Online Gaming Sector

PARIS, FRANCE — As the digital landscape becomes increasingly sophisticated, the intersection of cybersecurity and regulated online services has become a critical focal point for IT professionals. In France, the online gambling industry serves as a primary case study in how stringent regulatory frameworks—specifically those enforced by the National Gaming Authority (ANJ) — function not […]
PortSwigger Blog15 · 2026-01-22 15:18

How I sped up exploit validation in Repeater using Burp AI

Note: This is a guest post by IT security consultant Adarsh Kumar. I’ve been using Burp Suite day to day for years, so when Burp AI was introduced, I was curious how it would actually hold up dur
X1r0z Blog12 · 2026-01-22 00:00

Attack Surface Analysis of Cursor

Cursor 攻击面分析
VentureBeat AI8 · 2026-01-22 14:00

Railway secures $100 million to challenge AWS with AI-native cloud infrastructure

Railway , a San Francisco-based cloud platform that has quietly amassed two million developers without spending a dollar on marketing, announced Thursday that it raised $100 million in a Series B funding round, as surging demand for artificial intelligence applications exposes the limitations of legacy cloud infrastructure. TQ Ventures led the round, with participation from FPV Ventures , Redpoint , and Unusual Ventures . The investment values Railway as one of the most significant infrastruc...
[DRAGNET]5 · 2026-01-22 08:00

New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack

New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack    The Hacker News
[DRAGNET]0 · 2026-01-22 08:00

Osiris: New Ransomware, Experienced Attackers?

Osiris: New Ransomware, Experienced Attackers?    SECURITY.COM
[DRAGNET]-40 · 2026-01-22 08:00

Top 10 Ransomware Attacks Over The Past Year

Top 10 Ransomware Attacks Over The Past Year    Cybercrime Magazine