Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-17

SentinelOne Labs41 · 2026-03-17 13:00

LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here

Andrew MacPherson exposes how crypto thieves exploit DeFi architecture, from the $1.5 billion Bybit heist to drainers-as-a-service and fund laundering.
OpenAI Blog36 · 2026-03-17 00:00

Equipping workers with insights about compensation

New research shows Americans send nearly 3 million daily messages to ChatGPT asking about compensation and earnings, helping close the wage information gap.
Elastic Security Labs35 · 2026-03-17 00:00

Get started with Elastic Security from your AI agent

Go from zero to a fully populated Elastic Security environment without leaving your IDE, using open source Agent Skills.
Huntress Blog34 · 2026-03-17 14:00

Huntress Expands Into Proactive Security Posture Management

Huntress "shifts left" with Managed ESPM and Managed ISPM. We proactively harden your endpoints and identities to close the security gaps that attackers love to exploit.
OpenAI Blog32 · 2026-03-17 10:00

OpenAI Japan announces Japan Teen Safety Blueprint to put teen safety first

OpenAI Japan announces the Japan Teen Safety Blueprint, introducing stronger age protections, parental controls, and well-being safeguards for teens using generative AI.
OpenAI Blog27 · 2026-03-17 10:00

Introducing GPT-5.4 mini and nano

GPT-5.4 mini and nano are smaller, faster versions of GPT-5.4 optimized for coding, tool use, multimodal reasoning, and high-volume API and sub-agent workloads.
Mandiant | Transform Your Cybersecurity20 · 2026-03-17 18:00

How Intelligence Led Security Drives Both Financial Savings and Proactive Protection

Many security leaders struggle to recognize and prove the tangible value of their existing threat intelligence investments. In a landscape drowning in telemetry, the challenge isn't just collecting data, but validating that it actually makes the organization prepared to respond to threats and ultimately more proactive. Recognizing this value is critical for justifying budgets and ensuring that security tools are delivering the protection and resilience promised. Join Shanyn Ronis, Lead Staff ...
Deeplinks15 · 2026-03-17 08:03

Bonus Podcast Episode: Privacy’s Defender - Cindy Cohn with Cory Doctorow

While How to Fix the Internet is on hiatus, we wanted to share a great conversation with you from last week. EFF Executive Director Cindy Cohn spoke with bestselling novelist, journalist, and EFF Special Advisor Cory Doctorow about Cindy’s new book, “Privacy’s Defender: My Thirty-Year Fight Against Digital Surveillance” ( MIT Press ). %3Ciframe%20height%3D%2252px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simpl...
paper - Last paper15 · 2026-03-17 01:50

CUDA Agent:面向高性能 CUDA 内核生成的大规模智能体强化学习

作者:Weinan Dai, Hanlin Wu, Qiying Yu等 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2602.24286v1/https://arxiv.org/html/2602.24286v1 摘要 GPU内核优化是现代深度学习的基础,但仍是一项高度专业化的任务,需要深厚的硬件专业知识。尽管大语言模型(LLM)在通用编程任务中表现...
martinalderson.com15 · 2026-03-17 00:00

Using agents and Wine to move off Windows

How I used Claude Code to fix Linux desktop issues, get 'garbage'-rated Windows apps working in Wine, and what it means for software ecosystems
Proofpoint Threat Insight12 · 2026-03-17 21:00

CursorJack: weaponizing Deeplinks to exploit Cursor IDE

Author’s Note: This post reflects Proofpoint Threat Research observations in a controlled test environment as of January 19, 2026. Proofpoint has no commercial, customer, partner, or vendor relationship with Cursor (published by Anysphere, Inc.). Cursor did not review or endorse this report. We notified Cursor through its vulnerability‑reporting channel; the report was closed as out‑of‑scope / Not Applicable under their policy. Findings are presented as a risk pattern involving deeplink‑drive...
Linux Foundation Blogs12 · 2026-03-17 01:26

Zephyr at 10: A Decade of Open Source Embedded Innovation

Ten years ago, the Zephyr Project was launched with a bold vision: to build a neutral, secure, and vendor-independent real-time operating system (RTOS) that could thrive in the most resource-constrained environments. Today, I am thrilled to share our latest research report, Zephyr Turns 10: A Decade of Adoption, Maturity, and Ecosystem Evolution , which empirically captures the incredible maturity of this community from its earliest formation stage to foundational digital infrastructure.
Infosecurity11 · 2026-03-17 12:00

Surge in Nation State Attacks on UK Firms Amid Cyber Warfare Fears

Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks
Infosecurity8 · 2026-03-17 10:15

UK Cyber Monitoring Centre Sets Its Sights on US Expansion One Year After Launch

The US Cyber Monitoring Center should be operational in 2027, said the UK CMC leadership
[DRAGNET]5 · 2026-03-17 07:00

RondoDox botnet expands arsenal targeting 174 flaws, and hits 15,000 daily exploit attempts

RondoDox botnet expands arsenal targeting 174 flaws, and hits 15,000 daily exploit attempts    Security Affairs
[DRAGNET]5 · 2026-03-17 07:00

Medusa ransomware gang claims attacks on prominent Mississippi hospital, New Jersey county

Medusa ransomware gang claims attacks on prominent Mississippi hospital, New Jersey county    The Record from Recorded Future News
[DRAGNET]-40 · 2026-03-17 07:00

The rising APT risk reshaping cyber insurance for critical infrastructure

The rising APT risk reshaping cyber insurance for critical infrastructure    Forbes India