Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-02-14

Threatninja.net117 · 2026-02-14 14:58

Hack The Box: Soulmate machine walkthrough – Easy Difficulitty

Just completed the Soulmate machine on Hack The Box — rated Easy, but packed with a satisfying vuln chain! Started with subdomain enumeration → discovered an exposed CrushFTP admin panel on ftp.soulmate.htb. Exploited an unauthenticated API flaw (CVE-2025-31161 style) in the /WebInterface/function/ endpoint to enumerate users and create a backdoor admin account. From there, abused broken access controls in User Manager to reset the "ben" account password. Logged in as "ben" → gained VFS acces...
Bruce's Blog44 · 2026-02-14 00:10

OpenClaw Architecture Deep Dive: How Automation Actually Works

A complete walkthrough of the OpenClaw AI agent framework internals (2026) — how Gateway routes messages to Agents, how Skills orchestrate tools, how Nodes enable cross-device execution, and how Heartbeat and Cron power always-on automation.
matklad.github.io10 · 2026-02-14 00:00

Justifying text-wrap: pretty

Something truly monumental happened in the world of software development in 2025. Safari shipped a reasonable implementation of text-wrap: pretty: https://webkit.org/blog/16547/better-typography-with-text-wrap-pretty/. We are getting closer and closer to the cutting-edge XV-century technology. Beautiful paragraphs!
[DRAGNET]5 · 2026-02-14 08:00

Threat Actors Exploit Claude Artifacts and Google Ads to Target macOS Users

Threat Actors Exploit Claude Artifacts and Google Ads to Target macOS Users    CyberSecurityNews