Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-02-25

Trail of Bits67 · 2026-02-25 12:00

mquire: Linux memory forensics without external dependencies

If you’ve ever done Linux memory forensics, you know the frustration: without debug symbols that match the exact kernel version, you’re stuck. These symbols aren’t typically installed on production systems and must be sourced from external repositories, which quickly become outdated when systems receive updates. If you’ve ever tried to analyze a memory dump only to discover that no one has published symbols for that specific kernel build, you know the frustration. Today, we’re open-sourcing m...
Fortinet Threat Research Blog32 · 2026-02-25 14:00

Unmasking Agent Tesla: A Deep Dive into a Multi-Stage Campaign

FortiGuard Labs provides a technical breakdown of a multi-stage Agent Tesla campaign, from phishing and encrypted scripts to in-memory execution, process hollowing, and data exfiltration
Infosecurity11 · 2026-02-25 14:30

44% Surge in App Exploits as AI Speeds Up Cyber-Attacks, IBM Finds

IBM's 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws
Infosecurity8 · 2026-02-25 10:30

Former Defense Contractor Boss Gets 7+ Years for Selling Zero Days

A former general manager of a US defense contractor has been sentenced after selling zero days to Russia
Infosecurity8 · 2026-02-25 09:40

ICO’s £14m Reddit Fine Highlights Age Check Privacy Concerns

The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully
Haptik8 · 2026-02-25 03:16

When AI Listens: Security and Privacy Challenges in Enterprise AI Voice Agents

Voice has rapidly become the main interface between enterprises and their customers. AI voice agents now handle service requests, authentication, payments, and issue resolution at scale. In doing so, they move beyond responding, they actively listen , in real-time and at scale. When AI listens, the security and privacy stakes fundamentally change. The focus is no longer limited to protecting databases and dashboards, but extends to safeguarding live conversations, emotions, and intent. This s...
[DRAGNET]0 · 2026-02-25 08:00

Top 20 Vulnerabilities Exploited by Cyber Attackers

Top 20 Vulnerabilities Exploited by Cyber Attackers    Qualys