Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-10

Check Point Research47 · 2026-03-10 16:54

Iranian MOIS Actors & the Cyber Crime Connection

Key Points Iran-linked actors are increasingly engaging with the cyber crime ecosystem. Their activity suggests a growing reliance on criminal tools, services, and operational models in support of state objectives. Iranian actors have long used cyber crime and hacktivism as cover for destructive activity, but the trend now suggests direct engagement with the criminal ecosystem. […] The post Iranian MOIS Actors & the Cyber Crime Connection appeared first on Check Point Research .
Toptal32 · 2026-03-10 04:00

Python Logging Handlers: A Deep Dive Into Types, Configuration, and Best Practices

Python’s logging system goes far beyond basic message output. This guide explores handlers, structured logging, performance trade-offs, and real-world patterns for building production-ready logging pipelines.
The Red Canary Blog: Information Security Insights30 · 2026-03-10 13:00

The RSAC 2026 Conference talks worth catching

Threat modeling for AI supply chain risks, disrupting infostealers, and dumb ways to die: We combed through 600+ RSAC 2026 talks.
Cloudflare Blog (Security)30 · 2026-03-10 13:00

Investigating multi-vector attacks in Log Explorer

Log Explorer customers can now identify and investigate multi-vector attacks. Log Explorer supports 14 additional Cloudflare datasets, enabling users to have a 360-degree view of their network.
OpenAI Blog27 · 2026-03-10 10:00

New ways to learn math and science in ChatGPT

ChatGPT introduces interactive visual explanations for math and science, helping students explore formulas, variables, and concepts in real time.
OpenAI Blog24 · 2026-03-10 11:00

Improving instruction hierarchy in frontier LLMs

IH-Challenge trains models to prioritize trusted instructions, improving instruction hierarchy, safety steerability, and resistance to prompt injection attacks.
[DRAGNET]17 · 2026-03-10 07:00

Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites

Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites    www.trendmicro.com
Trend Micro Simply Security17 · 2026-03-10 00:00

Through the Lens of MDR: Analysis of KongTuke’s ClickFix Abuse of Compromised WordPress Sites

Our analysis of an active KongTuke campaign deploying modeloRAT — malware capable of reconnaissance, command execution, and persistent access — through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.
Quarkslab's blog15 · 2026-03-10 23:00

PageJack in Action: CVE-2022-0995 exploit

PageJack is a Linux kernel exploitation technique useful to generate a Use After Free (UAF) in the page allocator. In this article we provide a detailed example of how to use it to exploit a Linux kernel vulnerability from 2022.
Mandiant | Transform Your Cybersecurity15 · 2026-03-10 19:00

The AI-Powered Adversary: Tracking the New Wave of LLM-Enabled Cyber Attacks

Threat actors are no longer using Artificial Intelligence (AI) just for basic productivity gains; they have entered a new operational phase by deploying novel, AI-enabled malware and evolving their Tactics, Techniques, and Procedures (TTPs) across the entire attack lifecycle. In this briefing, drawn from the latest Google Threat Intelligence Group (GTIG) reporting, we will expose the ways both cyber criminals and state-sponsored groups are abusing Large Language Models (LLMs) to achieve their...
paper - Last paper15 · 2026-03-10 17:29

基于图像的提示注入:通过视觉嵌入的对抗性指令劫持多模态大语言模型

作者:Neha Nagaraja, Lan Zhang, Zhilong Wang 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2603.03637v1/https://arxiv.org/html/2603.03637v1 摘要:多模态大语言模型(MLLMs)融合视觉与文本能力赋能各类应用,但这种融合也引入了新的安全漏洞。本文研究基于图像的提示注入(...
Mandiant | Transform Your Cybersecurity15 · 2026-03-10 17:00

From IOC to Action in Minutes: Unlocking Agentic Capabilities in Google Threat Intel

For modern security teams, the gap between detecting a suspicious indicator and fully understanding the threat is often measured in days—time that defenders simply don’t have. Manually correlating data, mapping TTPs, and authoring detection rules creates critical bottlenecks that slow down response and burn out analysts. Join Tim Gallo, Lead Global Solutions Architect, as he demonstrates how to shatter these bottlenecks using the new Agentic capabilities within Google Threat Intelligence. Tim...
Infosecurity14 · 2026-03-10 15:30

Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds

Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell
Trend Micro Simply Security12 · 2026-03-10 00:00

CISOs in a Pinch: A Security Analysis of OpenClaw

Learn about OpenClaw (a sovereign agent) and how this can be viable for enterprises.
Infosecurity11 · 2026-03-10 10:00

ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign

Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks
matduggan.com10 · 2026-03-10 09:26

Update to the Ghost theme that powers this site

I added a few modifications to the OSS Ghost theme that powers this site. You can get it here: https://gitlab.com/matdevdug/minimal-ghost-theme Added better image caption support. Added the cool Mastodon feature outlined here to attribute posts from your site back to your Mastodon username by following the
Stripe8 · 2026-03-10 00:00

Analyzing first-party fraud trends: Account, free trial, and refund abuse

From November 2025 to February 2026, our models detected 6.2x more abusive free trials across the Stripe network. This is part of a broader shift toward first-party fraud, where legitimate users abuse policies by setting up multiple accounts, cycling through free trials, or exploiting refunds.
We Live Security » Languages » English6 · 2026-03-10 09:58

Sednit reloaded: Back in the trenches

The resurgence of one of Russia’s most notorious APT groups
Stack Overflow6 · 2026-03-10 07:40

Even the chip makers are making LLMs

Ryan welcomes Kari Briski, NVIDIA’s VP of Generative AI Software for Enterprise, to the show to explore how a chip manufacturer got into the model development game.
[DRAGNET]5 · 2026-03-10 07:00

Chinese APT Campaign Targets Qatar With PlugX Lures Tied to Middle East Conflict

Chinese APT Campaign Targets Qatar With PlugX Lures Tied to Middle East Conflict    CyberSecurityNews
[DRAGNET]-40 · 2026-03-10 11:28

U.S. Critical Infrastructure Faces Growing Threat From Iran-Linked Hackers

U.S. Critical Infrastructure Faces Growing Threat From Iran-Linked Hackers    cyberpress.org
[DRAGNET]-40 · 2026-03-10 07:00

Chinese APT Campaign Uses Middle East Lures to Target Qatar With PlugX

Chinese APT Campaign Uses Middle East Lures to Target Qatar With PlugX    GBHackers News