Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-11

Trail of Bits45 · 2026-03-11 11:00

Six mistakes in ERC-4337 smart accounts

Account abstraction transforms fixed “private key can do anything” models into programmable systems that enable batching, recovery and spending limits, and flexible gas payment. But that programmability introduces risks: a single bug can be as catastrophic as leaking a private key. After auditing dozens of ERC‑4337 smart accounts, we’ve identified six vulnerability patterns that frequently appear. By the end of this post, you’ll be able to spot these issues and understand how to prevent them....
Huntress Blog40 · 2026-03-11 14:00

How Threat Actors Abuse Remote Management Tools | Huntress

The abuse of remote monitoring and management (RMM) tools is surging. See how threat actors daisy chain RMM software for initial access, persistence, and detection evasion.
OpenAI Blog32 · 2026-03-11 00:00

Wayfair boosts catalog accuracy and support speed with OpenAI

Wayfair uses OpenAI models to improve ecommerce support and product catalog accuracy, automating ticket triage and enhancing millions of product attributes at scale.
Cloudflare Blog (Security)30 · 2026-03-11 13:00

AI Security for Apps is now generally available

Cloudflare AI Security for Apps is now generally available, providing a security layer to discover and protect AI-powered applications, regardless of the model or hosting provider. We are also making AI discovery free for all plans, to help teams find and secure shadow AI deployments.
Proofpoint Threat Insight29 · 2026-03-11 19:04

Iran conflict drives heightened espionage activity against Middle East targets

Analyst note: Proofpoint uses the UNK_ designator to define clusters of activity that are still developing and have not been observed for long enough to receive a numerical TA designation. This report reflects Proofpoint Threat Research’s observations as of the date of publication and does not constitute geopolitical analysis or policy commentary.  What happened  On 28 February 2026, the US and Israel conducted strikes targeting assets inside Iran, in a campaign the US called Operation Epic F...
OpenAI Blog24 · 2026-03-11 11:30

Designing AI agents to resist prompt injection

How ChatGPT defends against prompt injection and social engineering by constraining risky actions and protecting sensitive data in agent workflows.
Krypt3ia17 · 2026-03-11 18:50

Threat Intelligence Analysis Report: Iranian cyber actor capabilities and likely asymmetric retaliation scenarios against U.S. interests

Subject: Iranian cyber actor capabilities and likely asymmetric retaliation scenarios against U.S. interestsDate: March 11, 2026Analytic basis: OSINT synthesis of official advisories, sanctions/designations, ATT&CK group tracking, and current reporting Introduction The ongoing military conflict involving Iran, the United States, and Israel has significantly degraded Iranian domestic infrastructure, including telecommunications networks, energy facilities, and portions of […]
ProjectDiscovery.io | Blog17 · 2026-03-11 16:59

Inside the benchmark: app architectures, walkthroughs of findings, and what each scanner actually caught

This is Part 2 of our vibe coding security benchmark study. In Part 1, we compared how LLM-based security tools like ProjectDiscovery's Neo and Claude Code performed against traditional SAST and DAST scanners on AI-generated code. We found that LLM-based tools like Neo and Claude Code detected many high-value findings that traditional scanners missed. Between Neo and Claude Code, Neo produced more true positives and fewer false positives because it could validate hypotheses against a running app
Infosecurity17 · 2026-03-11 16:00

Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker Studio

LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data
Articles | InfoStealers17 · 2026-03-11 15:39

How One Infostealer Infection Solved a Global Supply Chain Mystery and Unmasked DPRK Spies in U.S. Crypto

How One Infostealer Infection Solved a Global Supply Chain Mystery and Unmasked DPRK Spies in U.S. Crypto. Researcher & Law Enforcement Notice: Hudson Rock welcomes researchers and law enforcement teams to contact us in order to receive the full, unredacted infected machine data post-verification via contact@hudsonrock.com. Executive Summary: Key Findings The Infiltrator-in-Chief (Gate.us): The operative […] The post How One Infostealer Infection Solved a Global Supply Chain Mystery and Unmas...
Infosecurity17 · 2026-03-11 14:45

Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign

Over 250 legitimate websites, including news outlets and a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers
Bitdefender Labs17 · 2026-03-11 13:04

Windows and macOS Malware Spreads via Fake “Claude Code” Google Ads

Bitdefender’s security researchers have discovered a malicious Google Ads campaign targeting anyone searching for downloads related to Claude, the large language model developed by Anthropic.
Darknet – Hacking Tools, Hacker News & Cyber Security14 · 2026-03-11 01:00

Credential Stuffing in 2025 – How Combolists, Infostealers and Account Takeover Became an Industry

Credential stuffing drove 22% of all breaches in 2025. How combolists, infostealers and ATO tooling are fuelling enterprise account takeover at scale
Infosecurity12 · 2026-03-11 13:35

Researchers Discover Major Security Gaps in LLM Guardrails

Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools
Infosecurity8 · 2026-03-11 16:50

France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025

French small and medium businesses remained the organizations most targeted by ransomware in 2025
Intigriti8 · 2026-03-11 00:00

Intigriti collaborates with PortSwigger to support ethical hacking excellence

Intigriti and PortSwigger collaborate to reward hard-working hackers Best known as the creator of Burp Suite, the industry-standard toolkit for manual web application security testing, PortSwigger is a UK-based cybersecurity company on a mission to help the world secure the web. Today, their tools are trusted by over 20,000 organizations worldwide to detect and prevent cyber threats. To further support the cybersecurity community, PortSwigger is collaborating with Intigriti to reward high-ach...
[DRAGNET]-40 · 2026-03-11 07:00

Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped Systems

Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped Systems    zetter-zeroday.com