Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-02-05

Blogs on STAR Labs278IN STACK · 2026-02-05 00:00

Pickling the Mailbox: A Deep Dive into CVE-2025-20393

TL;DR In December 2025, Cisco published https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 addressing CVE-2025-20393, a critical vulnerability (CVSS 10.0) affecting Cisco Secure Email Gateway and Secure Email and Web Manager. The advisory was notably sparse on technical details, describing only “Improper Input Validation” (CWE-20). We decided to dig deeper. Through reverse engineering and code analysis of AsyncOS 15.5.3, we uncovered the ro...
Huntress Blog61 · 2026-02-05 15:00

Windows ProjFS Internals: A Technical Deep Dive | Huntress

Huntress uncovers the mechanics of the Windows Projected File System. Explore the ProjFS driver, virtualization roots, and the PowerShell commands.
Blog27 · 2026-02-05 12:54

Cybereason TTP Briefing Q4 2025: Diverse Phishing Tactics and RATs on the Rise

Explore the latest trends, techniques, and procedures (TTPs) our incident response (IR) experts are actively facing with the TTP Briefing Q4 2025, a report built on frontline threat intelligence from our global incident response investigations, enriched by noteworthy detections from our SOC.
OpenAI Blog27 · 2026-02-05 00:00

GPT-5.3-Codex System Card

GPT‑5.3-Codex is the most capable agentic coding model to date, combining the frontier coding performance of GPT‑5.2-Codex with the reasoning and professional knowledge capabilities of GPT‑5.2.
OpenAI Blog27 · 2026-02-05 00:00

Introducing GPT-5.3-Codex

GPT-5.3-Codex is a Codex-native agent that pairs frontier coding performance with general reasoning to support long-horizon, real-world technical work.
OpenAI Blog24 · 2026-02-05 11:00

GPT-5 lowers the cost of cell-free protein synthesis

An autonomous lab combining OpenAI’s GPT-5 with Ginkgo Bioworks’ cloud automation cut cell-free protein synthesis costs by 40% through closed-loop experimentation.
8th Light15 · 2026-02-05 06:00

The Design Process and Agile Development: Part 1 — Design Is Collaborative

This is Part 1 in our blog series on how the design process works alongside Agile methodology to produce results within an integrated team. Updated 2/5/2026. Originally published 2/2/2024   When it comes to developing new software, not every designer approaches the task the same way. While some use a design thinking approach , looking at the tasks from a user perspective, others use Agile methods , approaching it from an iterative project management standpoint. However, the two approaches are...
NVISO Labs12 · 2026-02-05 10:54

An introduction to automated LLM red teaming

Introduction As large language models become increasingly embedded in production applications, from customer service chatbots to code assistants and document analysis tools, the security implications of these systems have moved from theoretical concern to practical necessity. Unlike traditional software security testing, LLM red teaming addresses unique challenges: prompt injection attacks, data leakage through carefully crafted … Continue reading An introduction to automated LLM red teaming →
Addy Osmani12 · 2026-02-05 00:00

Claude Code Swarms

Claude Code now supports agent teams - coordinated swarms of AI agents that research, debug, and build in parallel. What was feature-flagged is now real. Here's what it means and how to use it.
[DRAGNET]5 · 2026-02-05 11:03

Reynolds: Defense Evasion Capability Embedded in Ransomware Payload

Reynolds: Defense Evasion Capability Embedded in Ransomware Payload    SECURITY.COM
[DRAGNET]5 · 2026-02-05 08:00

CISA confirms exploitation of VMware ESXi flaw by ransomware attackers

CISA confirms exploitation of VMware ESXi flaw by ransomware attackers    Help Net Security
[DRAGNET]5 · 2026-02-05 08:00

New APT group breached gov and critical infrastructure orgs in 37 countries

New APT group breached gov and critical infrastructure orgs in 37 countries    csoonline.com
[DRAGNET]0 · 2026-02-05 08:00

10 Types of Information Security Threats for IT Teams

10 Types of Information Security Threats for IT Teams    TechTarget
[DRAGNET]0 · 2026-02-05 08:00

Ransomware attacks against education sector slow worldwide

Ransomware attacks against education sector slow worldwide    K-12 Dive