Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-27

Blog | Praetorian320IN STACK · 2026-03-27 03:12

Reflecting on Your Tier Model: CVE-2025-33073 and the One-Hop Problem

The False Sense of Security SMB signing on domain controllers has become standard practice across most Active Directory environments. But this hardening may have created a false sense of security. CVE-2025-33073 changes the calculus by removing the prerequisite of admin access, enabling NTLM relay attack Active Directory exploitation through unconstrained delegation. Domain controllers enforce SMB […] The post Reflecting on Your Tier Model: CVE-2025-33073 and the One-Hop Problem appeared firs...
Simon Willison45 · 2026-03-27 20:59

Vibe coding SwiftUI apps is a lot of fun

I have a new laptop - a 128GB M5 MacBook Pro, which early impressions show to be very capable for running good local LLMs. I got frustrated with Activity Monitor and decided to vibe code up some alternative tools for monitoring performance and I'm very happy with the results. This is my second experiment with vibe coding macOS apps - the first was this presentation app a few weeks ago . It turns out Claude Opus 4.6 and GPT-5.4 are both very competent at SwiftUI - and a full SwiftUI app can fi...
Fidelis Security39 · 2026-03-27 16:08

How Fidelis Network® Delivers Forensic-Level Visibility Across Hybrid Environments

See how Fidelis Network delivers deep session inspection, encrypted traffic analysis, and evidence-grade telemetry across cloud, datacenter, and OT. The post How Fidelis Network® Delivers Forensic-Level Visibility Across Hybrid Environments appeared first on Fidelis Security .
Elastic Security Labs35 · 2026-03-27 00:00

Elastic Security Labs uncovers BRUSHWORM and BRUSHLOGGER

Elastic Security Labs observed two custom malware components targeting a South Asian financial institution: a modular backdoor with USB-based spreading and a DLL-side-loaded keylogger.
OpenAI Blog27 · 2026-03-27 22:00

STADLER reshapes knowledge work at a 230-year-old company

Learn how STADLER uses ChatGPT to transform knowledge work, saving time and accelerating productivity across 650 employees.
先知安全技术社区15 · 2026-03-27 08:23

第三届长城杯半决赛-wso2:SOAP管理接口+H2文件读写绕过waf

前言比赛又被拷打了,等了好久这个题都没有wp,没招,只能自己梭哈了。环境搭建这里直接用的SfTian佬的复现平台打的题https://gz.imxbt.cn/。解题登录以及题目漏洞点分析首先访问题目,说明要https访问。https之后其实发现会跳转到localhost。这里需要输入接口/carbon/admin/login.jsp,才能正常访问。然后是找账户密码了,本地 repository/c
Infosecurity14 · 2026-03-27 12:30

Quantum Computing Threat to Encryption Is Closer Than Expected, Warns Google

‘Q-Day’ and the cybersecurity problems it brings could come as early as 2029 as Google accelerates its post-quantum cryptography migration
construction-physics.com12 · 2026-03-27 12:00

The Age of the Amplifier

As we’ve noted more than a few times before, for most of the 20th century AT&T’s Bell Labs was the premier industrial research lab in the US.
Intigriti12 · 2026-03-27 00:00

Intigriti Bug Bytes #234 - March 2026 🚀

Hello hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:   Earning $180K via SSRFs Free Burp Suite Pro licenses for top hackers  Bypassing tricky file upload restrictions Injecting malicious code into AI coding assistants And so much more! Let’s dive in! New: PortSwigger collaboration with Intigriti We've teamed up with PortSwigger to reward high-performing researchers on our platform. Any hacker who earns 400+ valid reputation points in a single…
Infosecurity11 · 2026-03-27 15:06

TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack

Socket and Endor Labs discovered a new TeamPCP campaign leading to the delivery of credential-stealing malware
Red Hat Security9 · 2026-03-27 00:00

4 use cases for AI in cyber security

In product security, AI represents a new and critical frontier. As artificial intelligence becomes mainstream in both defense tools and exploitation methods, security professionals must master these technologies to more effectively protect and enhance their systems.What is AI in cyber security?AI in cyber security is the application of advanced technologies like machine learning and automated reasoning to detect, prevent, and respond to digital threats at a scale and speed that exceeds human ...
We Live Security » Languages » English8 · 2026-03-27 07:00

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them
Discord Developer Blog8 · 2026-03-27 00:00

How Multi-Factor Authentication Helps Keep Your Discord Account Safe

A Discord account is more than just your username and avatar. That’s why it’s important to help keep your account safe and secure by using Multi-Factor Authentication, SMS Backup Authentication & QR Code Login. Learn how to keep your account more secure in the following blog post!
Red Hat Security6 · 2026-03-27 00:00

AI security: Identity and access control

In our first 3 articles, we framed AI security as protecting the system, not just the model, across confidentiality, integrity, and availability, and we showed why the traditional secure development lifecycle (SDLC) discipline still applies to modern AI deployments. We also focused on guardrails and different architectural approaches such as dual LLMs and CaMeL to help protect against prompt injection and unsafe actions.This article completes the defense strategy by focusing on the backbone t...
[DRAGNET]5 · 2026-03-27 07:00

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware    The Hacker News