Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-03

Telekom Security120 · 2026-03-03 00:00

Mass exploitation of CVE-2026-1281 and CVE-2026-1340 in Ivanti EPMM

Mass exploitation of CVE-2026-1281 and CVE-2026-1340 in Ivanti EPMM
Check Point Research52 · 2026-03-03 15:49

Silver Dragon Targets Organizations in Southeast Asia and Europe

Key Findings Introduction In recent months, Check Point Research (CPR) has been tracking a sophisticated, Chinese-aligned threat group whose activity demonstrates operational correlation with campaigns previously associated with APT41. We have designated this activity cluster as Silver Dragon. This group actively targets organizations in Southeast Asia and Europe, with a particular focus on government entities. […] The post Silver Dragon Targets Organizations in Southeast Asia and Europe appe...
Cloudflare Blog (Security)35 · 2026-03-03 06:00

From reactive to proactive: closing the phishing gap with LLMs

Email security is a constant arms race. Like WWII engineers reinforcing only the planes that returned, survivorship bias hides real gaps. But LLMs can help us find the invisible weaknesses.
Huntress Blog34 · 2026-03-03 15:00

The Evolving Linux Threat Landscape

Learn about the narrowing threat gap, the rise of cross-platform attacks (like WSL abuse), and the specific ransomware and nation-state actors targeting Linux endpoints in 2026.
OpenAI Blog32 · 2026-03-03 10:00

GPT-5.3 Instant: Smoother, more useful everyday conversations

GPT-5.3 Instant: Smoother, more useful everyday conversations
Evil Martians32 · 2026-03-03 00:00

The Flipper gem is amazing, here's how we extended it the Martian way

A deep dive extending Flipper in Rails: friendly actor IDs, team-wide flags, percentage rollouts, analytics events, and admin auditing.
Cloudflare Blog (Security)30 · 2026-03-03 06:00

How Cloudy translates complex security into human action

Cloudy is our LLM-powered explanation layer built directly into Cloudflare One. Its explanations, now part of Phishnet and API CASB, can improve user decisions and SOC efficiency.
OpenAI Blog27 · 2026-03-03 10:00

GPT-5.3 Instant System Card

GPT-5.3 Instant System Card
ProjectDiscovery.io | Blog17 · 2026-03-03 17:05

How Neo found an SSRF vulnerability in Faraday, and why it matters for every team that ships code

Executive Summary Neo found a Server-Side Request Forgery (SSRF) vulnerability in Faraday, a widely used HTTP client library in the Ruby ecosystem. This is Neo’s first credited CVE discovery. Neo is ProjectDiscovery’s AI security copilot for tasks like code review and vulnerability discovery. For this finding, Neo reviewed a widely used open source dependency and, without human guidance, surfaced a subtle URL-handling edge case, validated it in runtime, and produced a clear write-up that maint
Articles | InfoStealers17 · 2026-03-03 02:30

Infected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agent

Infected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agent State-sponsored cybercrime is evolving. Foundational research by Kudelski Security, utilizing Hudson Rock’s extensive cybercrime database, recently mapped out how North Korean (DPRK) IT workers use proxy networks to infiltrate Western companies, secure remote jobs, and fund their regime. But what happens […] The post Infected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agent appeared...
Infosecurity14 · 2026-03-03 16:15

Israel: RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS
Emergent Minds | paddo.dev12 · 2026-03-03 00:00

Your AGENTS.md is a Liability

Frontier models top out at 68% compliance with 500 instructions. Every rule you add makes every other rule less likely to be followed. The research explains why.
Infosecurity11 · 2026-03-03 14:30

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors
bishopfox.com11 · 2026-03-03 14:00

Beyond Electron: Attacking Alternative Desktop Application Frameworks

Tauri promises a lighter, security-first future beyond Electron—but does it actually reduce risk? Carlos Yanez uncovers how XSS and permissive configs can still be chained into RCE, walking through real-world exploitation techniques every appsec team should understand.
Infosecurity11 · 2026-03-03 10:30

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign

Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack
exp库-打造中文最大exploit库10 · 2026-03-03 00:00

WordPress Backup Migration 1.3.7 - Remote Command Execution

# Exploit Title: WordPress Backup Migration 1.3.7 - Remote Command Execution # Date: 2025-10-26 # Exploit Author: DANG # Vendor Homepage: https://backupbliss.com/ # Software Link: https://wordpress.org/plugins/backup-backup/ # Version: Backup Mi......
exp库-打造中文最大exploit库10 · 2026-03-03 00:00

mailcow 2025-01a - Host Header Password Reset Poisoning

# Exploit Title: mailcow 2025-01a - Host Header Password Reset Poisoning # Date: 2025-10-21 # Exploit Author: Iam Alvarez (AKA Groppoxx / Maizeravla) # Vendor Homepage: https://mailcow.email # Software Link: https://github.com/mailcow/mailcow-do......
exp库-打造中文最大exploit库10 · 2026-03-03 00:00

Easy File Sharing Web Server v7.2 - Buffer Overflow

# Exploit title: Easy File Sharing Web Server v7.2 - Buffer Overflow # Date: 16/10/2025 # Exploit Author: Donwor # X: @real_Donwor # Discord: Donwor # Website: https://github.com/D0nw0r # Software Link: https://www.exploit-db.com/apps/60f3ff1f3c......
exp库-打造中文最大exploit库10 · 2026-03-03 00:00

WeGIA 3.5.0 - SQL Injection

# Exploit Title: WeGIA 3.5.0 - SQL Injection # Date: 2025-10-14 # Exploit Author: Onur Demir (OnurDemir-Dev) # Vendor Homepage: https://www.wegia.org # Software Link: https://github.com/LabRedesCefetRJ/WeGIA/ # Version: <=3.5.0 # Tested on: L......
Stack Overflow9 · 2026-03-03 08:40

No need for Ctrl+C when you have MCP

Ryan sits down with Member of the Technical Staff at Anthropic and Model Context Protocol co-creator David Soria Parra to talk the evolution of MCP from local-only to remote connectivity, how security and privacy fit into their work with OAuth2 for authentication and authorization, and how they’re keeping MCP completely open-source and widely available by moving it to the Linux Foundation.
Infosecurity8 · 2026-03-03 11:00

Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks

Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches
Exploit-DB.com RSS Feed8 · 2026-03-03 00:00

[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow

Easy File Sharing Web Server v7.2 - Buffer Overflow
exp库-打造中文最大exploit库6 · 2026-03-03 00:00

Boss Mini v1.4.0 - Local File Inclusion (LFI)

# Exploit Title: Boss Mini v1.4.0 - Local File Inclusion (LFI) # Date: 07/12/2023 # Exploit Author: nltt0 # Version: 1.4.0 (Build 6221) # CVE: CVE-2023-3643 from requests import post from urllib.parse import quote from argparse import ArgumentP......
[DRAGNET]-40 · 2026-03-03 08:00

Iranian Use of Cybercriminal Tactics in Destructive Cyber Attacks: 2026 Updates

Iranian Use of Cybercriminal Tactics in Destructive Cyber Attacks: 2026 Updates    Halcyon
[DRAGNET]-40 · 2026-03-03 08:00

Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure

Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure    Dark Reading