Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-02-06

NOSEC 安全讯息平台 - 漏洞预警160 · 2026-02-06 02:51

【漏洞预警】SolarWinds Web Help Desk 代码执行漏洞 (CVE...

漏洞名称:SolarWinds Web Help Desk 代码执行漏洞(CVE-2025-40536/CVE-2025-40551)风险等级:高危风险受...
OpenAI Blog32 · 2026-02-06 10:00

Making AI work for everyone, everywhere: our approach to localization

OpenAI shares its approach to AI localization, showing how globally shared frontier models can be adapted to local languages, laws, and cultures without compromising safety.
Trend Micro Simply Security32 · 2026-02-06 00:00

Viral AI, Invisible Risks: What OpenClaw Reveals About Agentic Assistants

OpenClaw (aka Clawdbot or Moltbot) represents a new frontier in agentic AI: powerful, highly autonomous, and surprisingly easy to use. In this research, we examine how its capabilities compare to its predecessors’ and highlight the security risks inherent to the agentic AI paradigm.
Brendan Gregg6 · 2026-02-06 13:00

Why I joined OpenAI

The staggering and fast-growing cost of AI datacenters is a call for performance engineering like no other in history; it's not just about saving costs – it's about saving the planet. I have joined OpenAI to work on this challenge directly, with an initial focus on ChatGPT performance. The scale is extreme and the growth is mind-boggling. As a leader in datacenter performance, I've realized that performance engineering as we know it may not be enough – I'm thinking of new engineering methods ...
[DRAGNET]5 · 2026-02-06 08:00

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware    The Hacker News
[DRAGNET]5 · 2026-02-06 08:00

APT-Q-27 Exploits Weaknesses In Corporate Security To Launch Silent, Undetected Attacks

APT-Q-27 Exploits Weaknesses In Corporate Security To Launch Silent, Undetected Attacks    cyberpress.org
[DRAGNET]5 · 2026-02-06 08:00

APT-Q-27 Targeting Corporate Environments in Stealthy Attack Without Triggering Alerts

APT-Q-27 Targeting Corporate Environments in Stealthy Attack Without Triggering Alerts    CyberSecurityNews
[DRAGNET]5 · 2026-02-06 08:00

Chinese APT Group Uses Linux Exploits To Redirect Traffic and Deploy Malicious Software

Chinese APT Group Uses Linux Exploits To Redirect Traffic and Deploy Malicious Software    cyberpress.org
[DRAGNET]-40 · 2026-02-06 08:00

APT-Q-27 Launches Stealthy Attacks on Corporate Networks, Evades Detection

APT-Q-27 Launches Stealthy Attacks on Corporate Networks, Evades Detection    GBHackers News