Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-01-28

Fortinet Threat Research Blog100 · 2026-01-28 14:00

Unveiling the Weaponized Web Shell EncystPHP

FortiGuard Labs analyzes EncystPHP, a stealthy web shell exploiting CVE-2025-64328 in FreePBX environments to enable remote command execution, persistence, and long-term system compromise
OpenAI Blog36 · 2026-01-28 01:00

EMEA Youth & Wellbeing Grant

Apply for the EMEA Youth & Wellbeing Grant, a €500,000 program funding NGOs and researchers advancing youth safety and wellbeing in the age of AI.
Intigriti29 · 2026-01-28 00:00

Intigriti 0126 CTF Challenge: Exploiting insecure postMessage handlers

At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. January's challenge presented participants with CRYPTIGRITI, a cryptocurrency trading platform where users could buy and trade Bitcoin (BTC), Monero (XMR), and a custom digital currency, 1337COIN. This article provides a step-by-step walkthrough for solving January's CTF challenge while demonstrating techniques for exploiting insecure postMessage implementations...
OpenAI Blog27 · 2026-01-28 01:00

The next chapter for AI in the EU

OpenAI launches the EU Economic Blueprint 2.0 with new data, partnerships, and initiatives to accelerate AI adoption, skills, and growth across Europe.
OpenAI Blog24 · 2026-01-28 00:00

Keeping your data safe when an AI agent clicks a link

Learn how OpenAI protects user data when AI agents open links, preventing URL-based data exfiltration and prompt injection with built-in safeguards.
We Live Security » Languages » English17 · 2026-01-28 09:59

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
Proofpoint Threat Insight12 · 2026-01-28 13:00

Can’t stop, won’t stop: TA584 innovates initial access

Key findings  TA584 is one of the most prominent cybercriminal threat actors tracked by Proofpoint threat researchers.  In 2025, the actor demonstrated multiple attack chain changes including expanded global targeting; ClickFix social engineering; and delivering new malware, Tsundere Bot.   TA584’s activity is unique in the cybercrime landscape and shows how static detections alone are not reliable for constantly innovating threat actors.   Overview  Proofpoint tracks multiple sophisticated c...