Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-10

Rapid7 Blog235IN STACK · 2026-04-10 19:11

Metasploit Wrap-Up 04/10/2026

Speedup Improvements of MSFVenom & New Modules This week, we have added new modules to Metasploit Framework targeting Cisco Catalyst SD-WAN controllers and osTicket as well as updates and improvements to Windows service-for-user persistence, and LDAP/ADCS-related modules to automatically report related services resulting in an improved data stream, which can be queried by using the services command. We also landed an improvement to msfvenom’s bootup time, thanks to  bcoles , resulting in an a...
Infosecurity211IN STACK · 2026-04-10 11:25

Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies

Chrome’s Device Bound Session Credentials is designed to block infostealers from harvesting session cookie
tedium.co200IN STACK · 2026-04-10 03:47

The Solitaire Shuffle

A meditation on the game of Solitaire and its endless variations, which go well beyond what you can find in Windows 3.1.
Qualys Threat Research57 · 2026-04-10 17:26

The Mythos Inflection Point: Dealing With the Upcoming Vulnerability Disclosure Avalanche and Compressed Exploitation Window

Having spent years at Qualys working on vulnerability risk and remediation management, I have watched the disclosure and remediation cycles from every angle. I have seen vulnerability researchers find a critical flaw in OpenSSH and the industry scramble to respond. I have seen organizations patching Log4Shell when it is not even applicable in production environments. […]
OpenAI Blog39 · 2026-04-10 00:00

AI fundamentals

Learn what AI is, how it works, and how tools like ChatGPT use large language models. A clear, beginner-friendly guide to understanding artificial intelligence.
OpenAI Blog36 · 2026-04-10 00:00

ChatGPT for research

Learn how to use ChatGPT for research to gather sources, analyze information, and create structured, citation-backed insights.
OpenAI Blog36 · 2026-04-10 00:00

Research with ChatGPT

Learn how to research with ChatGPT using search and deep research to find up-to-date information, analyze sources, and generate structured insights.
OpenAI Blog36 · 2026-04-10 00:00

ChatGPT for sales teams

Learn how sales teams use ChatGPT to research accounts, personalize outreach, manage deals, and improve pipeline and conversion.
OpenAI Blog30 · 2026-04-10 00:00

Brainstorming with ChatGPT

Learn how to use ChatGPT to brainstorm ideas, organize thinking, and turn rough concepts into structured, actionable plans.
OpenAI Blog30 · 2026-04-10 00:00

Getting started with ChatGPT

Learn how to use ChatGPT, start your first conversation, and discover simple ways to write, brainstorm, and solve problems with AI.
OpenAI Blog30 · 2026-04-10 00:00

Financial services

Explore AI resources for financial services, including prompt packs, GPTs, guides, and tools to help institutions deploy and scale AI securely.
OpenAI Blog27 · 2026-04-10 00:00

Applications of AI at OpenAI

Explore how OpenAI products like ChatGPT, Codex, and APIs bring AI into real-world use for work, development, and everyday tasks.
OpenAI Blog27 · 2026-04-10 00:00

Healthcare

Explore how clinicians use ChatGPT to support diagnosis, documentation, and patient care with secure, HIPAA-compliant AI tools.
OpenAI Blog27 · 2026-04-10 00:00

Responsible and safe use of AI

Learn how to use AI responsibly with best practices for safety, accuracy, and transparency when using tools like ChatGPT.
OpenAI Blog27 · 2026-04-10 00:00

ChatGPT for operations teams

Learn how operations teams use ChatGPT to streamline workflows, improve coordination, standardize processes, and drive faster execution.
OpenAI Blog27 · 2026-04-10 00:00

Analyzing data with ChatGPT

Learn how to analyze data with ChatGPT by exploring datasets, generating insights, creating visualizations, and turning findings into actionable decisions.
OpenAI Blog27 · 2026-04-10 00:00

Writing with ChatGPT

Learn how to use ChatGPT for writing to draft, revise, and refine content with clear structure, tone, and intent.
OpenAI Blog27 · 2026-04-10 00:00

Creating images with ChatGPT

Learn how to create and refine images with ChatGPT using clear prompts, iterate on designs, and generate high-quality visuals in minutes.
OpenAI Blog27 · 2026-04-10 00:00

Prompting fundamentals

Learn prompting fundamentals and how to write clear, effective prompts to get better, more useful responses from ChatGPT.
OpenAI Blog27 · 2026-04-10 00:00

ChatGPT for finance teams

Learn how finance teams use ChatGPT to streamline reporting, analyze data, improve forecasts, and communicate insights more clearly.
OpenAI Blog27 · 2026-04-10 00:00

ChatGPT for marketing teams

Learn how marketing teams use ChatGPT to plan campaigns, generate content, analyze performance, and move from ideas to execution faster.
OpenAI Blog27 · 2026-04-10 00:00

Working with files in ChatGPT

Learn how to upload and work with files in ChatGPT to analyze data, summarize documents, and generate content from PDFs, spreadsheets, and more.
OpenAI Blog27 · 2026-04-10 00:00

ChatGPT for managers

Learn how managers use ChatGPT to prepare for conversations, write clear feedback, stay organized, and improve team effectiveness.
OpenAI Blog27 · 2026-04-10 00:00

Using custom GPTs

Learn how to build and use custom GPTs to automate workflows, maintain consistent outputs, and create purpose-built AI assistants.
OpenAI Blog27 · 2026-04-10 00:00

Personalizing ChatGPT

Learn how to personalize ChatGPT using custom instructions and memory to get more relevant, consistent, and tailored responses.
OpenAI Blog27 · 2026-04-10 00:00

Using skills

Learn how to create and use ChatGPT skills to build reusable workflows, automate recurring tasks, and ensure consistent, high-quality outputs.
OpenAI Blog27 · 2026-04-10 00:00

Using projects in ChatGPT

Learn how to use projects in ChatGPT to organize chats, files, and instructions, manage ongoing work, and collaborate more effectively.
OpenAI Blog27 · 2026-04-10 00:00

ChatGPT for customer success teams

Learn how customer success teams use ChatGPT to manage accounts, improve communication, reduce churn, and drive adoption and renewals.
OpenAI Blog24 · 2026-04-10 00:00

Our response to the Axios developer tool compromise

OpenAI responds to the Axios supply chain attack by rotating macOS code signing certificates, updating apps, and confirming no user data was compromised.
Deeplinks20 · 2026-04-10 13:50

We Need You: Our Privacy Cannot Afford a Clean Extension of Section 702

We go through this every couple of years: Section 702 of the Foreign Intelligence Surveillance Act (FISA), which  of Americans’ communications with foreign persons overseas  is up for renewal. As always, Congress can reauthorize it with or without changes, or just let it expire. We know, we know, it’s a pain to have to do this every few years –but it gives us a chance to lift the hood of this behemoth tool of government surveillance and tinker with how it works . That’s why it’s so important ...
Nvidia17 · 2026-04-10 19:40

National Robotics Week — Latest Physical AI Research, Breakthroughs and Resources

This National Robotics Week, NVIDIA is highlighting the breakthroughs that are bringing AI into the physical world — as well as the growing wave of robots transforming industries, from agricultural and manufacturing to energy and beyond. Advancements in robot learning, simulation and foundation models are accelerating development, enabling robots to move from training in virtual […]
Dark Reading17 · 2026-04-10 13:30

Industrial Controllers Still Vulnerable As Conflicts Move to Cyber

The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.
Codrops17 · 2026-04-10 13:27

The Exat Microsite: Pushing a Typography Showcase to New Creative Extremes

A case study on how motion, interaction, and scroll-driven design turned the Exat microsite into an expressive showcase for contemporary type.
嘶吼15 · 2026-04-10 03:59

嘶吼安全动态|八部门联合发布《 科技数据安全管理暂行规定》,4月10日起实施 黑客利用像素级SVG技巧隐藏信用卡窃密代码

嘶吼安全动态| 【国内新闻】 八部门联合发布《科技数据安全管理暂行规定》,4月10日起实施 摘要:明确科技数据分类分级、算法备案、跨境管控等要求,强化科研与算力设施安全。 原文链接: http://m.toutiao.com/group/7626936382984700451/ 腾讯QClaw V2上线“龙虾管家”,全流程防护AI操作安全 摘要:默认开启安全防护,覆盖Prompt、技能与脚本执行,实时拦截恶意指令、技能投毒、文件误删等风险。 原文链接: https://www.sohu.com/a/1007377777_115060?scm=10001.325_13-325_13.0.0-0-0-0-0.5_1334 新型底层木马NoVoice爆发,全球230万设备中招,格式化无法清除 摘要:Rootkit级恶意程序深度感染安卓与iOS,国内90万台设备中招,重置后仍复活,窃取隐私并远程控制。 原文链接: http://m.toutiao.com/group/7626734793590145587/ 海光信息全球首发“机密 Token”技术,锁死大模型隐私数据防泄露 摘要:海光信...
Cyber Kendra12 · 2026-04-10 17:15

React2DoS Flaw Can Crash Servers with One Request

A newly disclosed vulnerability in React Server Components can bring production servers to a complete halt using nothing more than a single, carefully crafted HTTP request — no credentials, no special access required. Researchers at Imperva's Offensive Team discovered and reported the flaw, tracked as CVE-2026-23869 and dubbed " React2DoS ." Rated high severity, the issue affects React Server Components version 19.2.4 and below. It also impacts Next.js versions 13.x through 16.x that use the ...
martinalderson.com12 · 2026-04-10 00:00

Has Mythos just broken the deal that kept the internet safe?

What Anthropic's Mythos research preview tells us about the trajectory of frontier models, sandbox escapes, and the cybersecurity risk ahead.
Infosecurity11 · 2026-04-10 12:00

Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month

Qilin, Akira and Dragonforce were responsible for 40% of 672 ransomware incidents reported in March, says Check Point
嘶吼11 · 2026-04-10 04:00

Progress ShareFile曝新漏洞 可组合实现未认证远程代码执行

最新发现,企业级安全文件传输解决方案 Progress ShareFile 存在两处漏洞,攻击者可将其组合利用,在无需身份认证的情况下从受影响环境中窃取文件。Progress ShareFile 是一款文档共享与协作产品,广泛应用于大中型企业。 此类文件传输平台历来是勒索软件团伙的重点攻击目标,此前 Clop 勒索组织就曾利用 Accellion FTA、SolarWinds Serv-U、Gladinet CentreStack、GoAnywhere MFT、MOVEit Transfer、Cleo 等产品中的漏洞实施大规模数据窃取攻击。  watchTowr 的研究人员在 Progress ShareFile 5.x 分支的 Storage Zones Controller(SZC,存储区域控制器)组件中,发现了一处认证绕过漏洞(CVE-2026-2699)和一处远程代码执行漏洞(CVE-2026-2701)。 存储区域控制器(SZC)允许用户将数据存储在自有基础设施(本地或第三方云)或 Progress 官方系统中,从而让客户对数据拥有更强的控制权。 在 watchTowr...
腾讯安全响应中心10 · 2026-04-10 17:45

从发现 33 个 0day 漏洞,看安全攻防的下半场 | 朱雀实验室

2026 年 4 月 7 日,Anthropic 联合 Apple、Google、Microsoft 等 45 家机构发布 Project Glasswing 计划,并宣布其尚未公开发行的前沿模型 Claude Mythos Preview 在所有主要操作系统和浏览器中发现了数千个…
Dark Reading10 · 2026-04-10 13:00

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.
exp库-打造中文最大exploit库10 · 2026-04-10 00:00

NetBT e-Fatura - Privilege Escalation

# Exploit Title: NetBT e-Fatura - Privilege Escalation # Author: Seccops # Discovery Date: 2025-10-03 # Vendor: https://net-bt.com.tr/e-fatura/ # Tested Version: 2024 # Tested on OS: Microsoft Windows Server 2019 DC # Vulnerability Type: CWE-428......
exp库-打造中文最大exploit库10 · 2026-04-10 00:00

D-Link DIR-650IN - Authenticated Command Injection

# Exploit Title: D-Link DIR-650IN - Authenticated Command Injection # Date: 2023-01-08 # Exploit Author: Sanjay Singh # Vendor Homepage: https://www.dlink.com # Software Link: https://dlinkmea.com/index.php/product/details?det=T082aVdUWUFNR2FRbl......
shkspr.mobi9 · 2026-04-10 11:34

[RSS Club] Why do you use RSS rather than Atom?

This post is exclusive to feed subscribers. Enjoy! This whole experiment is called RSS Club - but perhaps it should be called "XML-based distributed feed club"? I've been playing about with local-only and privacy-conscious view tracking. I can see how many people click on my stories from HN or Google or anywhere else. I also decided to add the number of times a story is viewed by someone…
Tenable Blog8 · 2026-04-10 12:10

Crushing the Axios supply chain threat with Tenable Hexa AI: Use cases for agentic AI

See how you can use Tenable Hexa AI to determine in minutes if you’re impacted by the Axios npm supply chain attack. Learn how easy it is to automate configuration of scans, identify impacted assets, prioritize remediation, and more using agentic AI from Tenable. Key takeaways:  Tenable Hexa AI, the agentic engine of the Tenable One Exposure Management Platform , can tell you in minutes if your organization is running compromised versions of the Axios npm package following a recent discovery ...
The Akamai Blog (https://blogs.akamai.com/feeds.html)8 · 2026-04-10 10:00

Why AI-Powered Vulnerability Discovery Strengthens Akamai's Security Mission

Why AI-Powered Vulnerability Discovery Strengthens Akamai's Security Mission
SentinelOne6 · 2026-04-10 13:00

The Good, the Bad and the Ugly in Cybersecurity – Week 15

FBI disrupts GRU router hijacking operation, ClickFix sidesteps Apple's Terminal mitigation, and Iranian actors exploit PLCs across U.S. infrastructure.
ProjectDiscovery.io | Blog6 · 2026-04-10 02:42

How We Cut LLM Costs by 59% With Prompt Caching

At ProjectDiscovery, we've been building Neo, an autonomous security testing platform that runs multi-agent, multi-step workflows, routinely executing 20-40+ LLM steps per task. Vulnerability assessments, code reviews, and security audits at scale, enabling continuous testing across the entire development lifecycle. When we launched, our LLM costs were staggering. A single complex task with Opus 4.5 could consume 60 million tokens. Then we implemented prompt caching. Here's what changed:
[DRAGNET]5 · 2026-04-10 13:09

Threat Actors Exploit GitHub and GitLab For Malware Delivery and Phishing Operations

Threat Actors Exploit GitHub and GitLab For Malware Delivery and Phishing Operations    cyberpress.org
[DRAGNET]5 · 2026-04-10 07:00

CPUID site hijacked to serve malware instead of HWMonitor downloads

CPUID site hijacked to serve malware instead of HWMonitor downloads    theregister.com
[DRAGNET]5 · 2026-04-10 07:00

CPUID compromise: users got malware with HWMonitor and CPU-Z tools

CPUID compromise: users got malware with HWMonitor and CPU-Z tools    Cybernews
[DRAGNET]5 · 2026-04-10 07:00

Security PSA: Popular Tools CPU-Z and HWMonitor Were Briefly Compromised

Security PSA: Popular Tools CPU-Z and HWMonitor Were Briefly Compromised    TechPowerUp
[DRAGNET]5 · 2026-04-10 07:00

FBI: Health care was top target for ransomware, other cyberthreats in 2025

FBI: Health care was top target for ransomware, other cyberthreats in 2025    American Hospital Association