Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-04-16

Palo Alto Unit 42380IN STACK · 12d ago

A Deep Dive Into Attempted Exploitation of CVE-2023-33538

CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware. The post A Deep Dive Into Attempted Exploitation of CVE-2023-33538 appeared first on Unit 42 .
OpenAI Blog224IN STACK · 13d ago

Codex for (almost) everything

The updated Codex app for macOS and Windows adds computer use, in-app browsing, image generation, memory, and plugins to accelerate developer workflows.
Dark Reading208IN STACK · 13d ago

Microsoft's Original Windows Secure Boot Certificate Is Expiring

The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. In other words, update those PCs soon.
Hexacorn200IN STACK · 12d ago

WerReportCreate API

The API I want to talk about today is called WerReportCreate. It takes a few arguments, but the most interesting is the first one, which is the Event Name. Looking at Windows OS binaries, we can see this API being … Continue reading →
Dark Reading200IN STACK · 12d ago

'Harmless' Global Adware Transforms Into an AV Killer

A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.
Docker200IN STACK · 12d ago

Why MicroVMs: The Architecture Behind Docker Sandboxes

Last week, we launched Docker Sandboxes with a bold goal: to deliver the strongest agent isolation in the market. This post unpacks that claim, how microVMs enable it, and some of the architectural choices we made in this approach. The Problem With Every Other Approach Every sandboxing model asks you to give something up. We...
Google AI Blog200IN STACK · 12d ago

A new way to explore the web with AI Mode in Chrome

Today’s upgrades for AI Mode in Chrome transform how you interact with the web
Simon Willison55 · 13d ago

datasette.io news preview

Tool: datasette.io news preview The datasette.io website has a news section built from this news.yaml file in the underlying GitHub repository. The YAML format looks like this: - date: 2026-04-15 body: |- [Datasette 1.0a27](https://docs.datasette.io/en/latest/changelog.html#a27-2026-04-15) changes how CSRF protection works in a way that simplifies form and API integration, and introduces a new `RenameTableEvent` for when a table is renamed by a SQL query. - date: 2026-03-18 body: |- ... This ...
Simon Willison50 · 12d ago

Qwen3.6-35B-A3B on my laptop drew me a better pelican than Claude Opus 4.7

For anyone who has been (inadvisably) taking my pelican riding a bicycle benchmark seriously as a robust way to test models, here are pelicans from this morning's two big model releases - Qwen3.6-35B-A3B from Alibaba and Claude Opus 4.7 from Anthropic . Here's the Qwen 3.6 pelican, generated using this 20.9GB Qwen3.6-35B-A3B-UD-Q4_K_S.gguf quantized model by Unsloth, running on my MacBook Pro M5 via LM Studio (and the llm-lmstudio plugin) - transcript here : And here's one I got from Anthropi...
Microsoft Security Blog49 · 13d ago

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire Sleet that abuses user driven execution and social engineering to bypass macOS security protections and steal credentials, cryptocurrency assets, and sensitive data. The post Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise appeared first on Microsoft Security Blog .
OpenAI Blog48 · 13d ago

Introducing GPT-Rosalind for life sciences research

OpenAI introduces GPT-Rosalind, a frontier reasoning model built to accelerate drug discovery, genomics analysis, protein reasoning, and scientific research workflows.
Simon Willison45 · 12d ago

llm-anthropic 0.25

Release: llm-anthropic 0.25 New model: claude-opus-4.7 , which supports thinking_effort : xhigh . #66 New thinking_display and thinking_adaptive boolean options. thinking_display summarized output is currently only available in JSON output or JSON logs. Increased default max_tokens to the maximum allowed for each model. No longer uses obsolete structured-outputs-2025-11-13 beta header for older models. Tags: llm , anthropic , claude
Deeplinks39 · 12d ago

How Push Notifications Can Betray Your Privacy (and What to Do About It)

A phone’s push notifications can contain a significant amount of information about you, your communications, and what you do throughout the day. They’re important enough to government investigations that Apple and Google now both require a judge’s order to hand details about push notifications over to law enforcement, and even with that requirement Apple  shares data on hundreds of users. More recently, we also learned from a 404 Media report that law enforcement forensic extraction tools can...
Sec-News 安全文摘39 · 13d ago

CVE-2026-34621 Root Cause Analysis

CVE-2026-34621 Root Cause Analysis
Microsoft Security Blog37 · 12d ago

Building your cryptographic inventory: A customer strategy for cryptographic posture management

Learn how to build a comprehensive cryptographic inventory and strengthen quantum‑safe readiness using Microsoft Security tools, best‑practice lifecycle models, and partner solutions. The post Building your cryptographic inventory: A customer strategy for cryptographic posture management appeared first on Microsoft Security Blog .
Facebook32 · 13d ago

Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways

We’re sharing lessons learned from Meta’s post-quantum cryptography (PQC) migration to help other organizations strengthen their resilience as industry transitions to post-quantum cryptography standards. We’re proposing the idea of PQC Migration Levels to help teams within organizations manage the complexity of PQC migration for their various use cases. By outlining Meta’s approach to this work [...] Read More... The post Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Ta...
Malwarebytes Unpacked32 · 13d ago

A fake Slack download is giving attackers a hidden desktop on your machine

This trojanized Slack installer looks normal, but quietly gives attackers an invisible desktop to access your accounts and data. We take a deep dive into the attack.
OpenAI Blog29 · 13d ago

Accelerating the cyber defense ecosystem that protects us all

Leading security firms and enterprises join OpenAI’s Trusted Access for Cyber, using GPT-5.4-Cyber and $10M in API grants to strengthen global cyber defense.
The Hacker News25 · 12d ago

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos
Insinuator.net22 · 13d ago

Disclosure: Command Injection in Geutebrück Cameras

During a penetration test for a customer, we identified a command injection vulnerability in Geutebrück security cameras that allows authenticated attackers to execute arbitrary commands as root through the web interface. The root cause is unsanitized user input being passed into a sed script (and at least 12 other CGI endpoints). In addition to the […]
Fuzzing Labs20 · 13d ago

Reproducing CVE-2026-23111: How one character can change everything

Exploiting n-day in the wild Reproducing CVE-2026-23111: How one character can change everything To prepare for Pwn2Own Berlin 2026, we decided to reproduce a known kernel CVE on Red Hat (kernel 6.12.0-124.38.1.el10_1, which was the latest version at the time). We chose the nf_tables subsystem because we were not very familiar with it and wanted to better...
The Register – Security17 · 12d ago

Anthropic won't own MCP 'design flaw' putting 200K servers at risk, researchers say

Bug or feature? A design flaw – or expected behavior based on a bad design choice, depending on who is telling the story – baked into Anthropic's official Model Context Protocol (MCP) puts as many as 200,000 servers at risk of complete takeover, according to security researchers.…
Security on TechRepublic17 · 12d ago

NTT Research Launches Scale Academy to Bring Lab Technology to Market

NTT Research launches Scale Academy to turn AI and security research into real products, debuting SaltGrain, a zero-trust data security platform. The post NTT Research Launches Scale Academy to Bring Lab Technology to Market appeared first on TechRepublic .
Sucuri Blog17 · 12d ago

Joomla SEO Spam Injector: Obfuscated PHP Backdoor Hijacking Site Visitors

Overview During a recent malware cleanup investigation, we encountered a compromised Joomla website where the site owner reported a strange issue. Their website displayed a large number of suspicious product links that had nothing to do with their business. These products were not added by the website owner and did not exist in their catalog. Visitors and search engines were seeing pages that promoted unrelated products, raising immediate concerns about spam injection or remote content manipu...
Infosecurity17 · 12d ago

APK Malformation Found in Thousands of Android Malware Samples

APK malformation tactic now appears in over 3000 Android malware samples evading static analysis
Graham Cluley17 · 13d ago

Sometimes changing the password on your email mailbox isn’t enough

Have you ever taken a look at your Microsoft 365 mailbox rules? If not, it might be worth a few minutes of your time. Because newly released research reveals that hackers may already have beaten you to it. Read more in my article on the Fortra blog.
The Register (Security)17 · 13d ago

Textbook titan McGraw Hill on ransomware crew's reading list after 13.5M records exposed

Publisher claims misconfigured Salesforce-hosted page leaked data Textbook giant McGraw Hill has landed on a ransomware crew's leak site after an alleged Salesforce-linked misconfiguration spilled 13.5 million records into the wild.…
The Register (Security)17 · 13d ago

Google Chrome lacks protection against one of the most basic and common ways to track users online

Browser fingerprinting is everywhere Google markets its Chrome browser by citing its superior safety features, but according to privacy consultant Alexander Hanff, Chrome does not protect against browser fingerprinting – a method of tracking people online by capturing technical details about their browser.…
404 Media17 · 13d ago

Thomson Reuters Shareholders Demand Investigation into ICE Contracts

The shareholders explicitly cited multiple 404 Media investigations, including one that showed Thomson Reuters' CLEAR is integrated with a tool ICE uses to find neighborhoods to target.
Sophos News17 · 13d ago

QEMU abused to evade detection and enable ransomware delivery

The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment Categories: Threat Research Tags: virtual machine, QEMU, PayoutsKing, GOLD ENCOUNTER, CitrixBleed2
IEEE Spectrum15 · 12d ago

IEEE Entrepreneurship Connects Hardware Startups With Investors

Roughly 90 percent of hard tech startups fail due to funding constraints, longer R&D timelines for developing hardware, and the complexity of manufacturing their products, according to a number of studies. Generally, these startups require up to 50 percent more investor financing than software ones, according to a Medium article . Typically, they need at least US $30 million, according to a Lucid article . That’s double the funding needed by software companies on average. To help them connect...
Payatu15 · 13d ago

IoT Penetration Testing: A Complete Methodology Guide with the OWASP ISTG Framework

In our last 20 IoT security assessments across automotive, MedTech, and consumer electronics, 17 devices had at least one debug interface (UART or JTAG) left fully accessible in production. In 9 of those cases, the exposed interface gave us an unauthenticated root shell within minutes of opening the enclosure. That single finding class alone invalidated every software-level security […] The post IoT Penetration Testing: A Complete Methodology Guide with the OWASP ISTG Framework  appeared firs...
SANS ISC15 · 13d ago

ISC Stormcast For Thursday, April 16th, 2026 https://isc.sans.edu/podcastdetail/9894, (Thu, Apr 16th)

ISC Stormcast For Thursday, April 16th, 2026 https://isc.sans.edu/podcastdetail/9894, (Thu, Apr 16th)
Thoughtbot15 · 13d ago

The AI stack I developed to help me context switch

How I use Obsidian, Claude Projects, and Gemini Meeting Notes to stay present when my brain has too many tabs open.
Tenable Blog14 · 12d ago

Beating the Mythos clock: Using Tenable Hexa AI custom agents for automated patching

See how Tenable Hexa AI custom agents empower you to counter machine-speed threats by automating vulnerability remediation. Learn how the Model Context Protocol (MCP) automates execution of risk-driven patching workflows, shifting your strategy from reactive tracking to continuous exposure management. Key takeaways Even in previews, powerful AI models like Claude Mythos show us how quickly adversaries could weaponize newly discovered vulnerabilities. Traditional, manual patching cycles can’t ...
The Hacker News13 · 13d ago

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow still ruining people's days, and enough supply chain drama to fill a season of television nobody asked for. Not
The Hacker News13 · 13d ago

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

A "novel" social engineering campaign has been observed abusing Obsidian, a cross-platform note-taking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage
The Hacker News13 · 13d ago

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp. The activity, which was observed between March and April
The Register (Security)12 · 12d ago

North Korea targets macOS users in latest heist

Social engineering: 'low-cost, hard to patch, and scales well' North Korean criminals set on stealing Apple users' credentials and cryptocurrency are using a combination of social engineering and a fake Zoom software update to trick people into manually running malware on their own computers, according to Microsoft.…
404 Media12 · 12d ago

App Stores Push Users Toward Nudify Apps, New Research Shows

Findings from the Tech Transparency Project claim that Google and Apple’s app stores not only host harmful apps that can undress images of women, but encourage users to find them.
The Register (Security)12 · 13d ago

Git identity spoof fools Claude into giving bad code the nod

Forged metadata made AI reviewer treat hostile changes as though they came from known maintainer Security boffins say Anthropic's Claude can be tricked into approving malicious code with just two Git commands by spoofing a trusted developer's identity.…
CISA Alerts12 · 13d ago

Anviz Multiple Products

View CSAF Summary Successful exploitation of these vulnerabilities could allow attackers to conduct reconnaissance, capture or decrypt sensitive data, alter device configurations, gain unauthorized administrative or root‑level access, execute arbitrary code, compromise credentials or communications, and ultimately obtain full control over affected devices. The following versions of Anviz Multiple Products are affected: CX2 Lite Firmware vers:all/* (CVE-2026-32648, CVE-2026-40461, CVE-2026-356...
CISA Alerts12 · 13d ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2026-34197 Apache ActiveMQ Improper Input Validation Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of...
The Register (Security)12 · 13d ago

Microsoft announces product it doesn't want anyone to buy

Just migrate already, would you? But if you can't, Redmond will take your cash Microsoft will keep delivering security updates for old versions of Exchange Server and Skype for Business Server, after admitting that some customers aren't ready to make the move to newer products.…
PwnDefend12 · 13d ago

AI as the penetration tester

AI hype is everywhere, and don’t get me wrong, I’m a heavy AI user, I’m creating tools, conducting analysis and … Continue reading AI as the penetration tester
Schneier on Security12 · 13d ago

Human Trust of AI Agents

Interesting research: “ Humans expect rationality and cooperation from LLM opponents in strategic games .” Abstract: As Large Language Models (LLMs) integrate into our social and economic interactions, we need to deepen our understanding of how humans respond to LLMs opponents in strategic settings. We present the results of the first controlled monetarily-incentivised laboratory experiment looking at differences in human behaviour in a multi-player p-beauty contest against other humans and L...
The Register (Security)12 · 13d ago

Server-room lock was nothing but a crock

Your cybersecurity is only as good as the physical security of the servers PWNED   Welcome back to Pwned, the column where we immortalize the worst vulns that organizations opened up for themselves. If you’re the kind of person who leaves your car doors unlocked with a pile of cash in the center console, this week’s story is for you.…
hey.paris12 · 13d ago

Libraries Tasmania Research Fellowship

I’m really pleased to share that I’ve been awarded a 2026 Libraries Tasmania Research Fellowship . The project is on Tasmania’s space history, from the establishment of Rossbank Observatory in 1840 through to the contemporary work being done here on tracking interplanetary spacecraft. There’s a surprisingly long thread connecting convict-era astronomy in Hobart to the antennas, satellites, and deep-space tracking that I talk about most months on ABC Radio , and I’m looking forward to spending...
Proofpoint Threat Insight11 · 12d ago

Beyond the breach: inside a cargo theft actor’s post-compromise playbook

Key findings Proofpoint monitored a cargo theft actor’s post‑compromise activity for more than a month in a decoy environment operated by Deception.pro.  The attacker abused multiple remote access tools to establish persistence, including the use of a previously unknown third‑party signing‑as‑a‑service capability.  Proofpoint also observed extensive reconnaissance to identify financial access, payment platforms, and cryptocurrency assets to enable freight fraud and broader financial theft.  R...
Dark Reading11 · 12d ago

NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities

The National Institute of Standards and Technology is carving a new path for vulnerability remediation by changing the way it prioritizes software flaws.
Infosecurity11 · 13d ago

Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack

Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data
miguelgrinberg.com11 · 13d ago

SQLAlchemy 2 In Practice - Chapter 5 - Advanced Many-To-Many Relationships

This is the fifth chapter of my SQLAlchemy 2 in Practice book. If you'd like to support my work, I encourage you to buy this book, either directly from my store or on Amazon . Thank you! You have now learned the design blocks used in relational databases. Sometimes, however, these building blocks have to be "tweaked" a bit to achieve a desired goal. This chapter is dedicated to exploring a very useful variation on the many-to-many relationship.
[DRAGNET]10 · 12d ago

New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges

New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges    BleepingComputer
Real Python10 · 13d ago

Learning Path: Python Game Development

Build Python games from command-line projects to 2D graphical games with turtle, Tkinter, Pygame, and Arcade.
Infosecurity9 · 13d ago

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

NIST’s National Vulnerability Database will now prioritize enriching new and exploited flaws to address the record growth of reported CVEs
Infosecurity8 · 12d ago

US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea

US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms
Codrops8 · 13d ago

The Art of Complex Motion: Corentin Bernadou’s World of Shaders and Experimentation

A story of how sharing experiments, studying shaders, and pushing animation further helped shape a distinct motion practice.
Dancho Danchev's Blog8IoCs DETECTED · 13d ago

BitCoin Wallet Addresses From the Breached Forums Cybercrime-Friendly Forum Community - A Compilation

BitCoin Wallet Addresses From the Breached Forums Cybercrime-Friendly Forum Community - A Compilation
Dancho Danchev's Blog8IoCs DETECTED · 13d ago

Is Aquila (Dmitry) from WASM Forum Community the Author of the Carberp Banking Malware?

Is Aquila (Dmitry) from WASM Forum Community the Author of the Carberp Banking Malware?
Malwarebytes Unpacked8 · 13d ago

“iCloud storage is full” scam is back, and now it wants your payment details

Apple users: Watch out for “upgrade now or lose your photos” scams that rush you into handing over your payment details.
Infosecurity8 · 13d ago

Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads

Ox Security claims as many as 200,000 servers are exposed by newly discovered MCP vulnerability
Dark Reading6 · 13d ago

Two-Factor Authentication Breaks Free From the Desktop

Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.
Dark Reading6 · 13d ago

6-Year Ransomware Campaign Targets Turkish Homes & SMBs

While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.
[DRAGNET]5 · 12d ago

Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face    BleepingComputer
[DRAGNET]5 · 12d ago

QEMU abused to evade detection and enable ransomware delivery

QEMU abused to evade detection and enable ransomware delivery    Sophos
[DRAGNET]5 · 13d ago

As a small business owner, I never expected to pay $100,000 protecting my business from ransomware

As a small business owner, I never expected to pay $100,000 protecting my business from ransomware    Fortune
[DRAGNET]5 · 13d ago

From clinics to government: UAC-0247 expands cyber campaign across Ukraine

From clinics to government: UAC-0247 expands cyber campaign across Ukraine    Security Affairs
[DRAGNET]0 · 13d ago

Ransomware Hits Automotive Data Expert Autovista

Ransomware Hits Automotive Data Expert Autovista    SecurityWeek
[DRAGNET]0 · 13d ago

Hackers Exploit n8n Webhooks to Spread Malware

Hackers Exploit n8n Webhooks to Spread Malware    gbhackers.com
[DRAGNET]0 · 13d ago

6-Year Ransomware Campaign Targets Turkish Homes & SMBs

6-Year Ransomware Campaign Targets Turkish Homes & SMBs    Dark Reading