Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-02

Docker208IN STACK · 2026-04-02 13:00

Docker Offload now Generally Available: The Full Power of Docker, for Every Developer, Everywhere.

Docker Desktop is one of the most widely used developer tools in the world, yet for millions of enterprise developers, running it simply hasn’t been an option. The environments they rely on, such as virtual desktop infrastructure (VDI) platforms and managed desktops, often lack the resources or capabilities needed to run Docker Desktop. As enterprises...
Docker203IN STACK · 2026-04-02 16:16

Gemma 4 is Here: Now Available on Docker Hub

Docker Hub is quickly becoming the home for AI models, serving millions of developers and bringing together a curated lineup that spans lightweight edge models to high-performance LLMs, all packaged as OCI artifacts. Today, we’re excited to welcome Gemma 4, the latest generation of lightweight, state-of-the-art open models. Built on the same technology behind Gemini,...
CISA Alerts100 · 2026-04-02 12:00

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation.  CVE-2026-3502  TrueConf Client Download of Code Without Integrity Check Vulnerability  This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities  established the KEV Catalog...
Simon Willison60 · 2026-04-02 20:40

Highlights from my conversation about agentic engineering on Lenny's Podcast

I was a guest on Lenny Rachitsky's podcast, in a new episode titled An AI state of the union: We've passed the inflection point, dark factories are coming, and automation timelines . It's available on YouTube , Spotify , and Apple Podcasts . Here are my highlights from our conversation, with relevant links. The November inflection point Software engineers as bellwethers for other information workers Writing code on my phone Responsible vibe coding Dark Factories and StrongDM The bottleneck ha...
Rapid7 Blog52 · 2026-04-02 13:00

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

Executive Overview Advanced persistent threats (APTs) are constantly and consistently changing tactics as network defenders plug holes in defenses. Static indicators of compromise (IoCs) for the BPFDoor have been widely deployed, forcing threat actors to get creative in their use of this particular strain of malware. What they came up with is ingenious. New research from Rapid7 Labs has uncovered undocumented features leading to the discovery of 7 new BPFDoor variants: a stealthy kernel-level...
Google Online Security Blog41 · 2026-04-02 16:00

Google Workspace’s continuous approach to mitigating indirect prompt injections

Google Workspace’s continuous approach to mitigating indirect prompt injections
Elastic Security Labs35 · 2026-04-02 00:00

How we caught the Axios supply chain attack

Joe Desimone shares the story of how he caught the Axios supply chain attack with a proof of concept tool built in an afternoon.
Elastic Security Labs35 · 2026-04-02 00:00

Hooked on Linux: Rootkit Detection Engineering

In this second part of a two-part series, we explore Linux rootkit detection engineering, focusing on the limitations of static detection reliance, and the importance of rootkit behavioral detection.
OpenAI Blog27 · 2026-04-02 10:00

Codex now offers more flexible pricing for teams

Codex now includes pay-as-you-go pricing for ChatGPT Business and Enterprise, providing teams a more flexible option to start and scale adoption.
paper - Last paper15 · 2026-04-02 18:48

GUARD‑SLM:面向小语言模型、基于令牌激活的越狱攻击防御方法

作者:Md. Jueal Mia1, Joaquin Molto1, Yanzhao Wu1, M. Hadi Amini 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2603.28817v1/https://arxiv.org/html/2603.28817v1 摘要 小语言模型(SLM)正成为大语言模型(LLM)高效且经济可行的替代方案,在计算成本...
Dropbox14 · 2026-04-02 17:00

Improving storage efficiency in Magic Pocket, our immutable blob store

By turning compaction into a layered, adaptive pipeline and strengthening our monitoring and controls, we made Magic Pocket more resilient to workload changes.
Mandiant | Transform Your Cybersecurity12 · 2026-04-02 17:00

The Future of AI in SecOps for Financial Services

Financial services organizations use diverse and complex IT infrastructure that often changes at an accelerated pace. Protecting that infrastructure requires dynamic, resilient cybersecurity strategies. Research further shows that FinServ organizations often have a higher bar when it comes to cybersecurity, requiring faster detection and response times, more visibility into potential risk, and more aggressive risk management and risk reduction programs. As SecOps races to keep up with the mas...
Infosecurity12 · 2026-04-02 15:00

New 'Storm' Infostealer Remotely Decrypts Stolen Credentials

This modern infostealer adopted server-side decryption of stolen credentials to bypass security controls
Fortinet Threat Research Blog12 · 2026-04-02 13:00

DPRK-Related Campaigns with LNK and GitHub C2

Analysis of DPRK-linked LNK-based attacks using GitHub as covert C2 infrastructure, detailing multi-stage PowerShell execution, persistence mechanisms, and data exfiltration techniques targeting Windows environments.
Infosecurity12 · 2026-04-02 13:00

Researchers Observe Sub-One-Hour Ransomware Attacks

Halcyon says Akira is now capable of carrying out an entire ransomware attack in less than an hour
Docker11 · 2026-04-02 18:14

Defending Your Software Supply Chain: What Every Engineering Team Should Do Now

The software supply chain is under sustained attack. Not from a single threat actor or a single incident, but from an ecosystem-wide campaign that has been escalating for months and shows no signs of slowing down. This week, axios, the HTTP client library downloaded 83 million times per week and present in roughly 80% of...
Infosecurity11 · 2026-04-02 13:00

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

LNK files use GitHub C2, embedded decoders and PowerShell for persistence and data exfiltration
miguelgrinberg.com11 · 2026-04-02 10:17

SQLAlchemy 2 In Practice - Chapter 3 - One-To-Many Relationships

This is the third chapter of my SQLAlchemy 2 in Practice book. If you'd like to support my work, I encourage you to buy this book, either directly from my store or on Amazon . Thank you! In the previous chapter you learned how to execute a variety of queries on the products table. Interestingly, some of those queries were designed to obtain product manufacturers and not products, and this required duplicates to be removed by grouping the results.
Deeplinks8 · 2026-04-02 22:43

Weakening Speech Protections Will Punish All of Us—Not Just Meta

Recently, a California Superior Court jury found that Meta and YouTube harmed a user through some of the features they offered. And a New Mexico jury concluded that Meta deceived young users into thinking its platforms were safe from predation.  It’s clear that many people are frustrated by big tech companies and perhaps Meta in particular. We, too, have been highly critical of them and have pushed for years to end their harmful corporate surveillance . So it’s not surprising that a jury felt...
SentinelOne8IoCs DETECTED · 2026-04-02 19:50

Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously

Read our blog post to learn how SentinelOne’s AI EDR autonomously stopped a global LiteLLM supply chain attack before execution.
The Akamai Blog (https://blogs.akamai.com/feeds.html)8 · 2026-04-02 17:00

PGBouncer: Connection Pooling for Managed PostgreSQL Databases

Learn how enabling PGBouncer reduces connection overhead, frees up server resources for query execution and disk caching, and improves performance at scale.
Deeplinks8 · 2026-04-02 15:12

Google and Amazon: Acknowledged Risks, and Ignored Responsibilities

In late 2024, we urged Google and Amazon to honor their human rights commitments, to be more transparent with the public, and to take meaningful action to address the risks posed by Project Nimbus, their cloud computing contract that includes Israel’s Ministry of Defense and the Israeli Security Agency. Since then, a stream of additional reporting has reinforced that our concerns were well-founded. Yet despite mounting evidence of serious risk, both companies have refused to take action.  Ama...
Deeplinks6 · 2026-04-02 17:57

Print Blocking Won't Work - Permission to Print Part 2

This is the second post in a series on 3D print blocking, for the first entry check out: Print Blocking is Anti-Consumer - Permission to Print Part 1 Legislators across the U.S. are proposing laws to force “print blockers” on 3D printers sold in their states. This mandated censorware is doomed to fail for its intended purpose, but will still manage to hurt the professional and hobbyist communities relying on these tools. 3D printers are commonly used to repair belongings , decorate homes , pr...
Ben's Bites6 · 2026-04-02 13:02

Inside the leaked Claude Code files

Docs as files, a new markdown editor and April fools