Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-02-03

Cyber Threat Alliance29 · 2026-02-03 21:26

CTA Webinar – What AI Is Actually Changing in Open Source Security — Lessons from the OpenSSL CVEs

AI is reshaping how the security community discovers, triages, and responds to vulnerabilities in foundational open‑source projects. Using the recent AISLE finding of OpenSSL CVEs as a case study, this session explores what AI is actually changing- from code analysis and exploit prediction to coordination, communication, and patch velocity. Attendees will gain a clear view … Continued The post CTA Webinar – What AI Is Actually Changing in Open Source Security — Lessons from the OpenSSL CVEs a...
VAADATA – Ethical Hacking Services17 · 2026-02-03 10:29

Ransack Query Injection: Analysis and Exploitation of an ORM Vulnerability

Developers often rely on libraries to manage communications with databases. This saves them from having to write raw queries. These libraries generally support common operations such as searching and sorting data. This approach is generally preferable, provided that the libraries are kept up to date. Writing raw queries is complex, and errors can easily lead [...] The post Ransack Query Injection: Analysis and Exploitation of an ORM Vulnerability first appeared on VAADATA - Ethical Hacking Se...
Blog12 · 2026-02-03 11:35

Fake Installer: Ultimately, ValleyRAT infection

Cybereason Security Services issue Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them. In this Threat Analysis report, Cybereason Security Services investigates a fake installer attack we recently observed multiple times. We identified some findings that have not been documented in previous reports and obtained new threat intelligence insights from the malwares.
[DRAGNET]10 · 2026-02-03 08:00

APT28 Hackers Exploit Microsoft Office Zero-Day In Active Malware Campaign

APT28 Hackers Exploit Microsoft Office Zero-Day In Active Malware Campaign    cyberpress.org
[DRAGNET]5 · 2026-02-03 08:00

Notepad++ infrastructure hijacked by Chinese APT in sophisticated supply chain attack

Notepad++ infrastructure hijacked by Chinese APT in sophisticated supply chain attack    csoonline.com
[DRAGNET]5 · 2026-02-03 08:00

Chollima APT Hackers Weaponize LNK File to Deploy Sophisticated Malware

Chollima APT Hackers Weaponize LNK File to Deploy Sophisticated Malware    CyberSecurityNews
[DRAGNET]5 · 2026-02-03 08:00

Chollima APT Hackers Weaponize LNK Files to Deploy Sophisticated Malware

Chollima APT Hackers Weaponize LNK Files to Deploy Sophisticated Malware    GBHackers News
[DRAGNET]5 · 2026-02-03 08:00

CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test

CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test    CrowdStrike
[DRAGNET]-40 · 2026-02-03 08:00

Notepad++ update system compromised in potential state-sponsored attack

Notepad++ update system compromised in potential state-sponsored attack    SC Media
[DRAGNET]-40 · 2026-02-03 08:00

6 signs your computer has been compromised and how to check right now

6 signs your computer has been compromised and how to check right now    MakeUseOf