Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-09

Darknet – Hacking Tools, Hacker News & Cyber Security214IN STACK · 2026-03-09 01:00

DumpBrowserSecrets – Browser Credential Harvesting with App-Bound Encryption Bypass

DumpBrowserSecrets extracts saved passwords, cookies, OAuth tokens and autofill data from Chrome, Edge, Firefox, Opera and Vivaldi, bypassing App-Bound Encryption via Early Bird APC injection.
Alexander V. Leonov185 · 2026-03-09 22:59

About Remote Code Execution – Windows Shell (CVE-2026-21510) vulnerability

About Remote Code Execution – Windows Shell (CVE-2026-21510) vulnerability. A vulnerability from the February Microsoft Patch Tuesday. The Windows Shell is the primary interface through which users interact with the Windows operating system. It includes visible elements such as the Desktop, Taskbar, and the Start Menu. Protection Mechanism Failure (CWE-693) allows an attacker to execute […]
SentinelOne Labs41 · 2026-03-09 10:00

From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence

LLMs can turn CTI narratives into structured intelligence at scale, but speed-accuracy trade-offs demand careful design for operational defense workflows.

Fixing request smuggling vulnerabilities in Pingora OSS deployments

Today we’re disclosing request smuggling vulnerabilities when our open source Pingora service is deployed as an ingress proxy and how we’ve fixed them in Pingora 0.8.0.
Huntress Blog37 · 2026-03-09 14:00

36 Must-Know Password Statistics for 2026 | Huntress

The top password statistics might surprise you. Learn how common poor password hygiene is, plus tips for protecting your precious credentials better.
Cloudflare Blog (Security)35 · 2026-03-09 14:00

Active defense: introducing a stateful vulnerability scanner for APIs

Cloudflare’s new Web and API Vulnerability Scanner helps teams proactively find logic flaws. By using AI to build API call graphs, we identify vulnerabilities that standard defensive tools miss.
CERT Recently Published Vulnerability Notes29 · 2026-03-09 16:09

VU#976247: Retraction of "Antivirus and Endpoint Detection and Response Archive Scanning Engines may not properly scan malformed ZIP archives"

Overview Malformed ZIP headers can be used to obfuscate malicious content in ZIP files from antivirus detection tools. Despite the presence of malformed headers, custom extraction software can decompress the ZIP archive, allowing potentially malicious payloads to be recovered after successful antivirus evasion. After a review of the researcher's published PoC and further analysis of the case, we have determined that this issue does not meet the necessary criteria to be considered a vulnerabil...
OpenAI Blog24 · 2026-03-09 10:00

OpenAI to acquire Promptfoo

OpenAI is acquiring Promptfoo, an AI security platform that helps enterprises identify and remediate vulnerabilities in AI systems during development.
Google DeepMind Blog20 · 2026-03-09 13:52

From games to biology and beyond: 10 years of AlphaGo’s impact

Ten years since AlphaGo, we explore how it is catalyzing scientific discovery and paving a path to AGI.
bishopfox.com20 · 2026-03-09 13:00

Pre-Authentication SQL Injection in FortiClient EMS 7.4.4 - CVE-2026-21643

FortiClient EMS 7.4.4 contains a pre-authentication SQL injection vulnerability (CVSS 9.1) in its multi-tenant site routing middleware. An unauthenticated attacker can inject arbitrary SQL by sending a crafted Site HTTP header to any pre-auth endpoint.
Infosecurity17 · 2026-03-09 15:45

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data

Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub
[DRAGNET]17 · 2026-03-09 07:00

Russian military hackers revive advanced malware to spy on Ukraine, researchers say

Russian military hackers revive advanced malware to spy on Ukraine, researchers say    The Record from Recorded Future News
paper - Last paper15 · 2026-03-09 17:45

虚假 OpenClaw 安装程序如何传播 GhostSocks 恶意软件

作者:Jai Minton, Ryan Dowd 原文链接:https://www.huntress.com/blog/openclaw-github-ghostsocks-infostealer/https://www.huntress.com/blog/openclaw-github-ghostsocks-infostealer 摘要 信息窃取型恶意软件是针对面向公众系统发起严重攻击的初始访问...
Infosecurity8 · 2026-03-09 14:00

UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source

New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on
Trend Micro Simply Security8 · 2026-03-09 00:00

TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense

At [un]prompted 2026, TrendAI™ demonstrated how documents can be used to exploit AI-driven KYC pipelines and introduced FENRIR, an automated system for discovering AI vulnerabilities at scale.
[DRAGNET]5 · 2026-03-09 07:00

Iranian APT MuddyWater Uses Dindoor Malware to Target U.S. Networks

Iranian APT MuddyWater Uses Dindoor Malware to Target U.S. Networks    SOCRadar® Cyber Intelligence Inc.