Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-02-18

Trail of Bits45 · 2026-02-18 12:00

Carelessness versus craftsmanship in cryptography

Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of downstream projects. When we shared one of these bugs with an affected vendor, strongSwan, the maintainer provided a model response for security vendors. The aes-js/pyaes maintainer, on the other hand, has taken a more… cavalier approach. Trail of Bits doesn’t usually make a point of publicly calling out ...
OpenAI Blog27 · 2026-02-18 21:00

Introducing OpenAI for India

OpenAI for India expands AI access across the country—building local infrastructure, powering enterprises, and advancing workforce skills.
OpenAI Blog24 · 2026-02-18 00:00

Introducing EVMbench

OpenAI and Paradigm introduce EVMbench, a benchmark evaluating AI agents’ ability to detect, patch, and exploit high-severity smart contract vulnerabilities.
Bruce's Blog20 · 2026-02-18 02:00

MoltBot Explained: What It Is, How It Works, and Why It Renamed to OpenClaw

MoltBot (now OpenClaw) is an open-source personal AI agent that runs locally and executes real tasks via Telegram and WhatsApp. Learn its architecture, features, renaming history, and setup guide.
Infosecurity17 · 2026-02-18 10:10

Chinese APT Group Exploits Dell Zero-Day for Two Years

Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines
Infosecurity9 · 2026-02-18 15:00

AI Assistants Used as Covert Command-and-Control Relays

AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication
T.J. Maher8 · 2026-02-18 21:10

Investigating AI: Playwright-Test-Planner and Playwright-Test-Generator

Investigating AI: Playwright-Test-Planner and Playwright-Test-Generator
Infosecurity8 · 2026-02-18 16:00

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics
Black Hills Information Security8 · 2026-02-18 14:00

OSINT: How to Find, Use, and Control Open-Source Intelligence

OSINT stands for open-source intelligence, and it refers to all publicly available information on the open internet which has been obtained without any special requirements (paywalls, invitations, etc.). The post OSINT: How to Find, Use, and Control Open-Source Intelligence appeared first on Black Hills Information Security, Inc. .
[DRAGNET]5 · 2026-02-18 08:00

Ransomware surge in 2025 exposes mounting OT risk as industrial impacts outpace IT narratives

Ransomware surge in 2025 exposes mounting OT risk as industrial impacts outpace IT narratives    Industrial Cyber
[DRAGNET]5 · 2026-02-18 06:31

Hackers Exploit QR Codes To Spread Phishing and Malware Across Mobile Phones

Hackers Exploit QR Codes To Spread Phishing and Malware Across Mobile Phones    cyberpress.org