Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-01

[DRAGNET]225IN STACK · 2026-04-01 07:00

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released    The Hacker News
先知安全技术社区200IN STACK · 2026-04-01 13:32

axios-供应链投毒事件:安装即刻触发

本文围绕2026年3月31日axios在npm上发生的供应链投毒事件展开分析,系统梳理了恶意版本 0.30.4 与 1.14.1 的发布时间线、投毒方式及完整攻击链,说明攻击者如何在未修改axios主体运行时代码的情况下,通过新增恶意依赖 plain-crypto-js 并利用postinstall脚本在 Windows、macOS 和 Linux 平台拉取并执行二阶段载荷。文章进一步拆解了 se
先知安全技术社区115 · 2026-04-01 03:13

Langflow_CVE-2026-33017_RCE_分析与复现

Langflow未授权端点经exec()执行攻击者注入的组件代码,实现远程命令执行。
Trail of Bits45 · 2026-04-01 11:00

Mutation testing for the agentic era

Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measures execution, not verification. Test suites with high coverage can obfuscate the fact that critical functionality is untested as software develops over time. We saw this when mutation testing uncovered a high-severity Arkis protocol vulnerability , overlooked by coverage metrics, that would have allowed attackers to drain funds. Today, w...
Rapid7 Blog40 · 2026-04-01 13:00

What CISOs Should Expect from AI Powered MDR in 2026, According to Rapid7 CEO Corey Thomas

In the latest episode of Rapid7’s Experts on Experts, I’m joined by Rapid7 CEO Corey Thomas for a candid conversation about where AI is genuinely changing security operations, and where the hype still outruns reality. The short version is that AI is already improving productivity in software development, but the bigger shift for security leaders is what it can do with telemetry at scale. As Corey puts it, no team of humans can process all security telemetry, all the time, across an entire env...
Elastic Security Labs40 · 2026-04-01 00:00

Elastic releases detections for the Axios supply chain compromise

Hunting and detection rules for the Elastic-discovered Axios supply chain compromise.
Elastic Security Labs40 · 2026-04-01 00:00

Inside the Axios supply chain compromise - one RAT to rule them all

Elastic Security Labs analyzes a supply chain compromise of the axios npm package delivering a unified cross-platform RAT
Huntress Blog34 · 2026-04-01 14:00

OpenClaw, Rogue Agents, and Application Hygiene

OpenClaw AI agents pose identity and data risks if deployed with broad cloud permissions. Learn how to find and secure these apps before an attacker does.
Huntress Blog34 · 2026-04-01 09:00

The Three-Finger Test

See why the viral "three-finger test" is almost outdated, and how to build resilient security processes that protect your organization from identity-based attacks and social engineering, no matter how advanced the AI gets.
OpenAI Blog32 · 2026-04-01 02:00

Gradient Labs gives every bank customer an AI account manager

Gradient Labs uses GPT-4.1 and GPT-5.4 mini and nano to power AI agents that automate banking support workflows with low latency and high reliability.
Unit 4227 · 2026-04-01 18:30

Threat Brief: Widespread Impact of the Axios Supply Chain Attack

Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup. The post Threat Brief: Widespread Impact of the Axios Supply Chain Attack appeared first on Unit 42 .
Bruce's Blog27 · 2026-04-01 06:00

Cursor Composer 2 Review: The Kimi K2.5 Controversy and What It Means for AI Coding

Deep technical analysis of Cursor Composer 2, built on Moonshot AI Kimi K2.5. Benchmarks, pricing, the attribution scandal, and honest comparison with Claude Code.
T.J. Maher17 · 2026-04-01 12:48

Python Project: Blogger Spam Bulk Deleter Code Walkthrough: Pair-Coded with Claude but Human Explained!

Python Project: Blogger Spam Bulk Deleter Code Walkthrough: Pair-Coded with Claude but Human Explained!
Securelist17 · 2026-04-01 06:00

A laughing RAT: CrystalX combines spyware, stealer, and prankware features

Kaspersky researchers analyze a new CrystalX RAT distributed as MaaS and featuring extensive spyware, stealer, and prankware capabilities.
Bruce's Blog17 · 2026-04-01 02:00

Claude Code Open Source: The Rewrite That Hit 100K Stars in Hours

Deep technical analysis of Claude Code Open Source — the clean-room Python and Rust rewrite of Claude Code agent harness architecture, born from the March 2026 source code leak. Architecture comparison, legal implications, and honest assessment.
maurycyz.com15 · 2026-04-01 00:00

GopherTree

While gopher is usually seen as a proto-web, it's really closer to FTP. It has no markup format, no links and no URLs. Files are arranged in a hierarchically, and can be in any format. This rigid structure allows clients to get creative with how it's displayed ... which is why I'm extremely disappointed that everyone renders gopher menus like shitty websites: You see all that text mixed into the menu? Those are informational selectors: a non-standard feature that's often used to recreate hype...
Proofpoint Threat Insight14 · 2026-04-01 19:52

I’d come running back to EU again: TA416 resumes European government espionage campaigns

Key findings From mid-2025 onwards, the China-aligned threat actor TA416 resumed observed targeting of European government and diplomatic organizations following a period of reduced EU-focused activity in our telemetry. This TA416 activity included multiple waves of web bug and malware delivery campaigns against diplomatic missions to the European Union and NATO across a range of European countries. In March 2026, Proofpoint also observed TA416 expand targeting to include diplomatic and gover...
Infosecurity12 · 2026-04-01 09:00

Hackers Hijack Axios npm Package to Spread RATs

Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s account, researchers warn
Blogs on STAR Labs12 · 2026-04-01 00:00

CHECK Removed, Context Confused, Checkmate Achieved

TL;DR In January 2026, the Chrome Releases blog announced several security fixes across different Chrome components. One entry caught our attention: CVE-2026-0899 , an Out-of-Bounds memory access in V8 discovered by @p1nky4745 . Vulnerabilities in V8, especially OOB and Type Confusions are always interesting from a security research perspective. We decided to take a closer look. At the time of writing, the issue was still restricted and no public proof-of-concept was available. After reverse ...
Infosecurity11 · 2026-04-01 13:30

New Venom Stealer MaaS Platform Automates Continuous Data Theft

Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration
Graham Cluley11 · 2026-04-01 09:00

Alleged RedLine malware developer extradited to United States

A man has appeared in federal court in Austin, Texas, after being extradited to the United States to face charges related to his alleged role as a key developer of the notorious RedLine malware. Read more in my article on the Hot for Security blog.
先知安全技术社区8 · 2026-04-01 17:01

0day--JeecgBoot v3.9.1 多漏洞审计过程

该文章记录了jeecgboot两个0day漏洞的挖掘过程
Cyber Threat Alliance8 · 2026-04-01 10:00

Cyber Threat Alliance Welcomes Motorola Solutions as Newest Member

WASHINGTON – April 1, 2026 – Cyber Threat Alliance (CTA), a nonprofit organization dedicated to improving the cybersecurity of the global digital ecosystem, today announced Motorola Solutions as its newest member and first in the safety and security technology sector. CTA and Motorola Solutions, including the Public Safety Threat Alliance (PSTA) it founded and administrates, … Continued The post Cyber Threat Alliance Welcomes Motorola Solutions as Newest Member appeared first on Cyber Threat ...
Ariya Hidayat8 · 2026-04-01 04:42

Local, CPU-Friendly, High-Quality TTS (Text-to-Speech) with Kokoro

Just a few years ago, realistic local speech generation seemed unimaginable. Today, its quality is exceptional and, crucially, it delivers these results without compromising privacy.
ElcomSoft blog6 · 2026-04-01 14:21

Digital Rights vs. State Power – The Protectors

The first part of this series examined jurisdictions that have adopted a coercive approach to cryptographic barriers. Nations such as the United Kingdom, Australia, and France navigate the practical hurdles of end-to-end encryption through statutory workarounds. Rather than attempting to break the encryption itself, these legal systems apply pressure directly to the device owner – […]
Black Hills Information Security6 · 2026-04-01 14:00

Cloud Security: Tips and Resources for Securing the Cloud

This overview of the basics of Cloud Security includes some tips and resources for getting started in defending the cloud. The post Cloud Security: Tips and Resources for Securing the Cloud appeared first on Black Hills Information Security, Inc. .
[DRAGNET]5 · 2026-04-01 07:00

CPUID Website Compromised: Malware Delivered via CPU-Z and HWMonitor Download Links in April 2026

CPUID Website Compromised: Malware Delivered via CPU-Z and HWMonitor Download Links in April 2026    Rescana
[DRAGNET]5 · 2026-04-01 07:00

Google links Axios npm supply chain attack to North Korea-linked APT UNC1069

Google links Axios npm supply chain attack to North Korea-linked APT UNC1069    Security Affairs
[DRAGNET]0 · 2026-04-01 12:43

Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus

Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus    Hackread