Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-05

Trend Micro Simply Security214IN STACK · 2026-03-05 00:00

New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages

The BoryptGrab campaign uses fake SEO‑optimized GitHub repositories and deceptive download pages to distribute a data‑stealing malware family that delivers multiple payloads, including a reverse SSH backdoor, to Windows users.
OpenAI Blog53 · 2026-03-05 00:00

Introducing ChatGPT for Excel and new financial data integrations

OpenAI introduces ChatGPT for Excel and new financial app integrations, powered by GPT-5.4 to accelerate modeling, research, and analysis in regulated environments.
Huntress Blog39 · 2026-03-05 21:00

SSO vs. MFA: Key Differences, Compared + Explained | Huntress

SSO vs. MFA: Why choose between the two? Learn how both single sign-on and multi-factor authentication can improve your cybersecurity posture.
Huntress Blog34 · 2026-03-05 19:00

Most Common Passwords 2026: Is Yours on the List?

Discover the most common passwords that put you and your business at risk, and get easy tips to improve your password security.
Huntress Blog34 · 2026-03-05 08:00

RMM Abuse: When IT Convenience Bites Back

Cybercrime and RMM abuse is up 277% as attackers exploit trusted tools for stealthy access. Learn how to shift from overtrust to verifying behavior and secure your network.
OpenAI Blog32 · 2026-03-05 10:00

Reasoning models struggle to control their chains of thought, and that’s good

OpenAI introduces CoT-Control and finds reasoning models struggle to control their chains of thought, reinforcing monitorability as an AI safety safeguard.
OpenAI Blog27 · 2026-03-05 10:00

Introducing GPT-5.4

Introducing GPT-5.4, OpenAI’s most most capable and efficient frontier model for professional work, with state-of-the-art coding, computer use, tool search, and 1M-token context.
OpenAI Blog27 · 2026-03-05 10:00

GPT-5.4 Thinking System Card

GPT-5.4 Thinking System Card
OpenAI Blog27 · 2026-03-05 09:00

Ensuring AI use in education leads to opportunity

OpenAI shares new tools, certifications, and measurement resources to help schools and universities close AI capability gaps and expand opportunity.
OpenAI Blog27 · 2026-03-05 00:00

VfL Wolfsburg turns ChatGPT into a club-wide capability

By focusing on people, not pilots, the Bundesliga club is scaling efficiency, creativity, and knowledge—without losing its football identity.
OpenAI Blog27 · 2026-03-05 00:00

The five AI value models driving business reinvention

Five AI value models show how leaders can sequence AI from workforce fluency to process reinvention and build durable business advantage.
We Live Security » Languages » English17 · 2026-03-05 10:00

How SMBs use threat research and MDR to build a defensive edge

We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses
paper - Last paper15 · 2026-03-05 23:34

当 AI Agent 拥有系统权限:OpenClaw 安全风险全景分析

作者:知道创宇积极防御实验室 完整的 OpenClaw 安全实践 Skill、自动化审计工具已在 GitHub 开源。项目地址:https://github.com/knownsec/openclaw-security/https://github.com/knownsec/openclaw-security 一、背景说明 随着 AI Agent 技术的快速演进,具备自动化决策与自主执行能力的开源...
paper - Last paper15 · 2026-03-05 23:09

ZeroDayBench:评估大语言模型智能体在未知零日漏洞上的网络防御能力

作者:Nancy Lau1, Louis Sloot2, Jyoutir Raj等 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2603.02297v1/https://arxiv.org/html/2603.02297v1 摘要 大语言模型(LLMs)正越来越多地作为软件工程智能体部署,自主为代码仓库贡献内容。这类智能体的一大优势是能够发现并修复其负...
Mandiant | Transform Your Cybersecurity15 · 2026-03-05 16:00

Threat Hunting con Google Threat Intelligence - Episodio 6 (Versión en Español)

En este nuevo episodio de Threat Hunting con Google Threat Intelligence, vamos más allá de la detección básica para explorar cómo desenmascarar proactivamente operaciones de phishing. Mostraremos técnicas avanzadas para identificar infraestructuras de phishing dirigidas a marcas específicas. Además, profundizaremos en el análisis de kits de phishing, enseñándote a rastrear sus componentes para empezar a monitorizar nuevos sitios web y kits de phishing a medida que se suben a GTI. Únete a noso...
Infosecurity9 · 2026-03-05 11:00

Zero-Click FreeScout Bug Enables Remote Code Execution

Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction
Proofpoint Threat Insight9 · 2026-03-05 00:28

Disruption targets Tycoon 2FA, popular AiTM PhaaS

Key findings  Tycoon 2FA is one of the most popular phishing-as-a-service (PhaaS) platforms currently used by threat actors, and highest volume adversary-in-the-middle (AiTM) phishing threat in Proofpoint data.  Tycoon 2FA infrastructure was disrupted by public and private partners, including Proofpoint, Microsoft, Europol, Cloudflare, Coinbase, Crowell, eSentire, Health-ISAC, Intel 471, Resecurity, The Shadowserver Foundation, SpyCloud, and TrendAI, and additional European law enforcement pa...
Infosecurity8 · 2026-03-05 12:15

Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns

Exploit kit "Coruna" targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft
Broadcom Software Blogs8 · 2026-03-05 11:32

Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company

This activity began in early February and has continued in recent days. What organizations should expect next from Iran-aligned groups and the steps they should take to guard against cyberattacks.
Infosecurity6 · 2026-03-05 09:45

Europol Operation Seizes LeakBase Data Breach Site

A global operation has resulted in the takedown of popular cybercrime forum LeakBase
[DRAGNET]5 · 2026-03-05 13:45

Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company

Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company    SECURITY.COM
[DRAGNET]5 · 2026-03-05 13:00

Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware

Threat Actors Exploit Fake Claude Code Downloads to Deploy Infostealer Malware    GBHackers News
[DRAGNET]5 · 2026-03-05 08:00

Hackers exploit OpenClaw to spread malware via GitHub - and a little help from Bing

Hackers exploit OpenClaw to spread malware via GitHub - and a little help from Bing    TechRadar
[DRAGNET]5 · 2026-03-05 08:00

Hackers exploit OpenClaw to spread malware via GitHub - and help from Bing

Hackers exploit OpenClaw to spread malware via GitHub - and help from Bing    Yahoo Tech
[DRAGNET]-40 · 2026-03-05 08:00

Iranian APT Groups Target Critical Infrastructure Amid Geopolitical Tensions

Iranian APT Groups Target Critical Infrastructure Amid Geopolitical Tensions    cyberpress.org
[DRAGNET]-40 · 2026-03-05 08:00

Iran’s Seedworm APT caught lurking in US bank, airline, and software firm networks

Iran’s Seedworm APT caught lurking in US bank, airline, and software firm networks    Cybernews
[DRAGNET]-45 · 2026-03-05 08:00

The Iranian Cyber Capability 2026

The Iranian Cyber Capability 2026    Trellix