Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-03-31

Docker208IN STACK · 2026-03-31 17:57

Run and Iterate on LLMs Faster with Docker Model Runner on DGX Station

Back in October, we showed how Docker Model Runner on the NVIDIA DGX Spark makes it remarkably easy to run large AI models locally with the same familiar Docker experience developers already trust. That post struck a chord: hundreds of developers discovered that a compact desktop system paired with Docker Model Runner could replace complex...
先知安全技术社区206IN STACK · 2026-03-31 00:21

第一届 Polaris CTF-web题解

WEBbabydc网络 桥接靶机:10.190.20.23Workgroup/Domain Name: XMCVEHostnames: CASTLEVANIADomain Controllers: XMCVEActive Directory(活动目录)的 Windows 域环境内网1 台 DC 域控(核心,存所有账号、哈希、权限)多台 成员服务器(Web、邮件、数据库等)一堆 Win10/Win1
Docker200IN STACK · 2026-03-31 16:39

Docker Sandboxes: Run Agents in YOLO Mode, Safely

Agents have crossed a threshold. Over a quarter of all production code is now AI-authored, and developers who use agents are merging roughly 60% more pull requests. But these gains only come when you let agents run autonomously. And to unlock that, you have to get out of the way. That means letting agents run...
Check Point Research169 · 2026-03-31 13:16

Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

Key Points Introduction At the beginning of 2026, Check Point Research observed a series of targeted attacks against government entities in Southeast Asia carried out via a legitimate TrueConf software installed in the targets’ environment. The investigation led to the discovery of a zero-day vulnerability in the TrueConf client, tracked as CVE-2026-3502 with a CVSS score of 7.8. […] The post Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets appeared first on ...
Infosecurity100 · 2026-03-31 08:45

NCSC Urges Immediate Patching of F5 BIG-IP Bug

The National Cyber Security Centre wants UK firms to patch CVE-2025-53521
Rapid7 Blog52 · 2026-03-31 13:00

Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing

Initial Access Brokers (IABs) are a key component of the cybercrime ecosystem, offering hassle-free building blocks for ransomware, data theft, and extortion. Rapid7’s analysis of H2 2025 activity across five major forums grants fresh insight into a power balance shift toward initial access sales from newer marketplaces, such as RAMP and DarkForums. Higher asking prices and more focus on high-value sectors and large organizations, such as Government, Retail, and IT, reveal a mature and profit...
Trail of Bits45 · 2026-03-31 11:00

How we made Trail of Bits AI-native (so far)

This post is adapted from a talk I gave at [un]prompted , the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or download the slides . Most companies hand out ChatGPT licenses and wait for the productivity numbers to move. We built a system instead. A year ago, about 5% of Trail of Bits was on board with our AI initiative. The other 95% ranged from passively skeptical to actively resistant. Today we have 94 plug...
Palo Alto Unit 4243 · 2026-03-31 21:00

Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure

TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure appeared first on Unit 42 .
Palo Alto Unit 4243 · 2026-03-31 10:00

Double Agents: Exposing Security Blind Spots in GCP Vertex AI

Unit 42 uncovers a "double agent" flaw in Google Cloud's Vertex AI, demonstrating how overprivileged AI agents can compromise cloud environments. The post Double Agents: Exposing Security Blind Spots in GCP Vertex AI appeared first on Unit 42 .
Elastic Security Labs35 · 2026-03-31 00:00

Fake Installers to Monero: A Multi-Tool Mining Operation

Elastic Security Labs dissects a long-running operation deploying RATs, cryptominers, and CPA fraud through fake installer lures, tracking its evolution across campaigns and Monero payouts.
Huntress Blog34 · 2026-03-31 23:30

Supply Chain Compromise of axios npm Package

An NPM supply chain attack struck the ubiquitous open-source axios library and Huntress has observed over a hundred affected devices.
OpenAI Blog27 · 2026-03-31 13:00

Accelerating the next phase of AI

OpenAI raises $122 billion in new funding to expand frontier AI globally, invest in next-generation compute, and meet growing demand for ChatGPT, Codex, and enterprise AI.
Binary Ninja24 · 2026-03-31 13:42

Container Transforms: Working with Nested Binary Formats

Firmware analysis, malware triage, and embedded systems reverse engineering often require extracting files from nested container formats: TAR archives inside GZIP files, encrypted firmware wrapped in multiple compression layers, or password-protected ZIPs containing “infected” malware. Manually peeling each layer with separate tools gets old fast. Binary Ninja’s Container Transform system automates this workflow, handling detection, extraction, password management, and multi-layer nesting whi...
Fidelis Security17 · 2026-03-31 20:39

Behavioral Analysis in Cloud Workload Protection: Why Runtime Detection Is Now Mandatory

Runtime behavioral detection exposes credential abuse, lateral movement, and cloud workload threats signature tools miss. The post Behavioral Analysis in Cloud Workload Protection: Why Runtime Detection Is Now Mandatory appeared first on Fidelis Security .
Trend Micro Simply Security17 · 2026-03-31 00:00

TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats

TrendAI™ Research explored agentic AI cybercrime and EV infrastructure security through two research sessions at RSAC 2026.
Sucuri Blog15 · 2026-03-31 16:13

How to Fix “Not Secure” Warnings and SSL Issues in WordPress (8 Steps)

If you own a WordPress website and ever encountered the “ Not Secure ” warning, you might have worried that visitors would perceive your site as spam or fraudulent. Not only does this warning impact user trust, but it can also create technical search issues when both HTTP and HTTPS versions of your pages remain accessible or when redirects, canonicals, and sitemaps point to different URL versions. Browsers show the visible security warning, while search engines rely on permanent redirects, ca...
evanhahn.com15 · 2026-03-31 00:00

Notes from March 2026

March always seems to be my life’s busiest month. Things I wrote and made “The two kinds of error” : in my mind, software errors are divided into two categories: expected and unexpected errors. I finally wrote up this idea I’ve had for a long time. “All tests pass” is a short story about a strange, and sorta sad, experience I had with a coding agent. Inspired by others, I published a disclaimer about how I use generative AI to write this blog . My main rule of thumb: the final product must be...
Graham Cluley14 · 2026-03-31 07:37

Iranian hackers breach FBI director’s personal email, and post his CV and photos online

It's not every day that you read that the head of America's top law enforcement agency has been hacked, but then - these aren't ordinary times. Read more in my article on the Hot for Security blog.
Infosecurity12 · 2026-03-31 10:01

Employee Data Breaches Surge to Seven-Year High

Analysis from law firm Nockolds suggests non-cyber incidents are driving up employee data breaches
先知安全技术社区12 · 2026-03-31 06:54

Hack for a Change 2026 March: UN SDG 3 Writeup

Hack for a Change 2026 March: UN SDG 3 Writeup
Infosecurity11 · 2026-03-31 14:00

Phantom Project Bundles Infostealer, Crypter and RAT For Sale

Phantom Stealer .NET harvests browser credentials, cookies, cards, sessions, as stealer-as-a-service
Stack Overflow11 · 2026-03-31 07:40

How can you test your code when you don’t know what’s in it?

Ryan hosts SmartBear’s VP of AI and Architecture Fitz Nowlan to explore how we’re moving away from old assumptions about software development, the challenges of testing MCP servers as LLM-driven agents introduce non-determinism that breaks tradition, and how data locality and data construction are becoming more valuable when source code is so easy to generate.
CCC Event Blog10 · 2026-03-31 00:00

Håck-ma’s Castle

Nerds of all kinds, versammelt euch! Ein zweites Mal lädt das österreichische Chaos zu Gelage, Gesang und Gehåcke in unserem Lieblings-Chaos-Castle . Wieder mit dabei ist alles, was es für ein großartiges Sommer-Event braucht: die idyllische Apfelwiese zum Campen, Schlafsäle für alle, die lieber ein Dach über dem Kopf hätten, sowohl Bar als auch Barcamp (wir freuen uns auf eure Beiträge!) und Bettlaken zum durchs Schloss spuken. Datum: 27.8.–30.8.2026 (Do–So) auf Schloss Ottenschlag . (Empfoh...
Infosecurity9 · 2026-03-31 13:01

ChatGPT Security Issue Enabled Data Theft via Single Prompt

OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
腾讯安全响应中心8 · 2026-03-31 17:03

从4.8亿下载量的 LiteLLM投毒事件,看 AI 基础设施安全攻与防 | 朱雀实验室

近日,知名大模型网关工具 LiteLLM 遭遇供应链投毒,其 1.82.7和1.82.8 版本被植入恶意代码。由于该项目月下载量极高(近1亿月下载量),且被 DSPy 等众多主流…
先知安全技术社区8 · 2026-03-31 02:59

【AI安全】OpenClaw多阶段网页诱导绕过防护的RCE攻击

OpenClaw作为最近爆火的AI应用,其设计者已深刻意识到了外部攻击面的风险,并构建了多层的静态防护机制,但当攻击者利用长上下文的认知负载和任务导向性等手段逐步诱导AI忽略安全边界时,AI 似乎难以始终守住边界,最终仍可能执行恶意命令。
Sophos News8 · 2026-03-31 00:00

The High Cost of Low Trust: Our Commitment to Radical Transparency

Only 5% of organizations fully trust their cybersecurity providers. Let’s do better. Categories: Products & Services, Sophos Insights Tags: Trust, Trust Center, Privacy
Infosecurity6 · 2026-03-31 12:15

TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets

TeamPCP is exploring ways to monetize the secrets harvested during supply chain attacks, with identified ties to the Lapsus$ and Vect ransomware gangs
[DRAGNET]5 · 2026-03-31 12:55

APT groups and ransomware gangs are turning Singapore into prime cyber target, Cyfirma report finds

APT groups and ransomware gangs are turning Singapore into prime cyber target, Cyfirma report finds    Industrial Cyber
[DRAGNET]5 · 2026-03-31 07:00

Update anxiety: is it safe to run “apt update” during active supply chain attack

Update anxiety: is it safe to run “apt update” during active supply chain attack    Cybernews
[DRAGNET]5 · 2026-03-31 07:00

North Korean hackers blamed for hijacking popular Axios open source project to spread malware

North Korean hackers blamed for hijacking popular Axios open source project to spread malware    TechCrunch
[DRAGNET]0 · 2026-03-31 07:00

Axios npm package compromised to deploy malware

Axios npm package compromised to deploy malware    Sophos
[DRAGNET]0 · 2026-03-31 07:00

Axios Compromised With A Malicious Dependency

Axios Compromised With A Malicious Dependency    OX Security
[DRAGNET]0 · 2026-03-31 07:00

Attackers hijack Axios npm account to spread RAT malware

Attackers hijack Axios npm account to spread RAT malware    Security Affairs
[DRAGNET]-40 · 2026-03-31 07:00

Hackers hit axios, a hugely popular NPM library with 100M downloads: developers pulling trojans

Hackers hit axios, a hugely popular NPM library with 100M downloads: developers pulling trojans    Cybernews