Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-30

Trend Micro Simply Security211IN STACK · 2026-03-30 00:00

TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM

Moving beyond their LiteLLM campaign, TeamPCP weaponizes the Telnyx Python SDK with stealthy WAV‑based payloads to steal credentials across Linux, macOS, and Windows.
Alexander V. Leonov200IN STACK · 2026-03-30 20:00

March Linux Patch Wednesday

March Linux Patch Wednesday. In March, Linux vendors began addressing 575 vulnerabilities, which is 57 fewer than in February. Of these, 93 are in the Linux Kernel (⬇️ a significant decrease – there were 305 in February). There are two vulnerabilities with signs of in-the-wild exploitation: 🔻 RCE – Chromium (CVE-2026-3909, CVE-2026-3910) Additionally, for 130 […]
Infosecurity117 · 2026-03-30 10:45

Critical Citrix NetScaler Vulnerability Exploited in the Wild

Researchers from watchTowr and Defused have found evidence that attackers are actively exploiting CVE-2026-3055, a critical NetScaler vulnerability
Cloudflare Blog (Security)40 · 2026-03-30 06:00

Cloudflare Client-Side Security: smarter detection, now open to everyone

We are opening our advanced Client-Side Security tools to all users, featuring a new cascading AI detection system. By combining graph neural networks and LLMs, we've reduced false positives by up to 200x while catching sophisticated zero-day exploits.
先知安全技术社区20 · 2026-03-30 10:20

结合代码浅分析DigitalOcean Droplet Agent 命令注入预授权 RCE 漏洞(CVE-2026-24516)

结合代码浅分析DigitalOcean Droplet Agent 命令注入预授权 RCE 漏洞(CVE-2026-24516)
Infosecurity17 · 2026-03-30 12:00

DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection

Researchers at ReliaQuest warn of persistent malware campaign targeting enterprise credentials
Marcelo Rinesi17 · 2026-03-30 03:00

Already Disruptive: Journalism is a high-margin research technology, not a zero-margin content mill

Part of the crisis in journalism is one of image and self-image. Mapping and clarifying what journalism ...
Sophos News17 · 2026-03-30 00:00

Incident responders, s'il vous plait: Invites lead to odd malware events

A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway? Categories: Threat Research Tags: STAC6405, infostealer, RMM, Phishing
Troy Hunt's Blog14IoCs DETECTED · 2026-03-30 18:42

HIBP Mega Update: Passkeys, k-Anonymity Searches, Massive Speed Enhancements and a Bulk Domain Verification API

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite For a hobby project built in my spare time to provide a simple community service, Have I Been Pwned sure has, well, "escalated". Today, we support hundreds of thousands of website visitors each day, tens of millions of API queries, and hundreds of millions of password searches. We&
Deeplinks12 · 2026-03-30 15:12

EFF's Cindy Cohn on The Daily Show! Tonight Monday, March 30

EFF Executive Director Cindy Cohn will be on The Daily Show tonight, Monday March 30, at 11 pm ET and PT, speaking with host Jon Stewart. Cindy will discuss her long history of fighting for privacy online and her new book,   Privacy’s Defender: My Thirty-Year Fight Against Digital Surveillance  (MIT Press). The book details her own personal story alongside her role representing the rights and interests of technology users, innovators, whistleblowers, and researchers during the Crypto Wars of ...
Proofpoint Threat Insight12 · 2026-03-30 13:20

Security brief: tax scams aim to steal funds from taxpayers

What happened  Threat actors love to take advantage of tax season. It’s peak social engineering time: combine monetary concerns with often stressful responsibilities, sprinkle in the expectation of emails about taxes from multiple organizations and you’ve got a recipe for cybercrime.   So far in 2026 we’ve seen over a hundred campaigns leverage tax themes leading to  malware, remote monitoring and management (RMM) payloads, fraud, and credential phishing. Tax-themed campaigns are expected ann...
GoCardless12 · 2026-03-30 09:51

Commercial VRPs: What do your customers think?

Uncover the latest research on consumer appetite for commercial VRPs
Infosecurity9 · 2026-03-30 15:00

Cybercriminals Exploit Tax Season With New Phishing Tactics

Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams

Squarespace & Web Standards: How We Helped Bring HTML Video & Audio Lazy Loading to Today’s Browsers

At Squarespace, many of our core products are built on web standards, and our engineers are constantly pushing the boundaries of the web’s capabilities. Occasionally, those boundaries reveal a limitation: an opportunity for the web’s native capabilities to grow. This post is the story of how we found such an opportunity to work with the standards community to improve the web in a way that we – and everyone who uses it – can benefit.
Infosecurity8 · 2026-03-30 14:00

Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers

Lloyds app glitch exposed up to 447,936 customers’ transactions and personal data during update
Sucuri Blog6 · 2026-03-30 21:10

The Security Risks of Using Nulled WordPress Plugins

Every year, thousands of WordPress sites get compromised, and a surprising number of those infections trace back to a single decision: installing a nulled plugin . Nulled plugins promise premium features for little or no money. The problem is that the “savings” often come attached to malware, broken update paths, SEO damage, and legal headaches that cost far more than a legitimate license ever would. It might seem like a harmless shortcut, but it’s one that can unravel everything you’ve built...
[DRAGNET]5 · 2026-03-30 07:00

What is a Zero-Day Vulnerability? Risk, Examples & Defense

What is a Zero-Day Vulnerability? Risk, Examples & Defense    wiz.io
[DRAGNET]-40 · 2026-03-30 07:00

FBI warns Iran-linked cyber campaign uses Telegram bots to control compromised systems, scale attacks

FBI warns Iran-linked cyber campaign uses Telegram bots to control compromised systems, scale attacks    Industrial Cyber