Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Follow
User actions
Mark0
404 bio not found
Joined
Joined on
Jan 9, 2026
More info about @mark0_617b45cda9782a
Post
119 posts published
Comment
0 comments written
Tag
0 tags followed
When the SOC Goes to Deadwood: A Night to Remember
Mark0
Mark0
Mark0
Follow
Feb 6
When the SOC Goes to Deadwood: A Night to Remember
#
cybersecurity
#
infosec
#
incidentresponse
#
ransomware
Comments
Add Comment
1 min read
MCP in Burp Suite: From Enumeration to Targeted Exploitation
Mark0
Mark0
Mark0
Follow
Feb 6
MCP in Burp Suite: From Enumeration to Targeted Exploitation
#
cybersecurity
#
infosec
#
ai
#
pentesting
Comments
Add Comment
1 min read
The Engineer's Guide to Elastic Detections as Code
Mark0
Mark0
Mark0
Follow
Feb 6
The Engineer's Guide to Elastic Detections as Code
#
cybersecurity
#
infosec
#
automation
#
devsecops
Comments
Add Comment
1 min read
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test
Mark0
Mark0
Mark0
Follow
Feb 6
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test
#
cybersecurity
#
infosec
#
ransomware
#
edr
Comments
Add Comment
1 min read
What Security Teams Need to Know About OpenClaw, the AI Super Agent
Mark0
Mark0
Mark0
Follow
Feb 6
What Security Teams Need to Know About OpenClaw, the AI Super Agent
#
cybersecurity
#
infosec
#
ai
#
threatintelligence
Comments
Add Comment
1 min read
OfferUp scammers are out in force: Here’s what you should know
Mark0
Mark0
Mark0
Follow
Feb 6
OfferUp scammers are out in force: Here’s what you should know
#
cybersecurity
#
infosec
#
phishing
#
fraud
Comments
Add Comment
1 min read
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Mark0
Mark0
Mark0
Follow
Feb 6
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
#
cybersecurity
#
infosec
#
malware
#
supplychain
Comments
Add Comment
1 min read
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
Mark0
Mark0
Mark0
Follow
Feb 6
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
#
cybersecurity
#
infosec
#
malware
#
stanghouls
Comments
Add Comment
1 min read
[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
Mark0
Mark0
Mark0
Follow
Feb 6
[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
#
cybersecurity
#
infosec
#
kubernetes
#
exploit
Comments
Add Comment
1 min read
DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector
Mark0
Mark0
Mark0
Follow
Feb 6
DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector
#
cybersecurity
#
infosec
#
malware
#
wiper
Comments
Add Comment
1 min read
Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive
Mark0
Mark0
Mark0
Follow
Feb 6
Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive
#
cybersecurity
#
infosec
#
jwt
#
webdev
Comments
Add Comment
1 min read
EDR killer tool uses signed kernel driver from forensic software
Mark0
Mark0
Mark0
Follow
Feb 6
EDR killer tool uses signed kernel driver from forensic software
#
cybersecurity
#
infosec
#
malware
#
byovd
Comments
Add Comment
1 min read
2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration
Mark0
Mark0
Mark0
Follow
Feb 6
2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration
#
cybersecurity
#
infosec
#
analysis
#
technical
Comments
Add Comment
1 min read
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
Mark0
Mark0
Mark0
Follow
Feb 6
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
#
cybersecurity
#
infosec
#
malware
#
asyncrat
Comments
Add Comment
1 min read
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
Mark0
Mark0
Mark0
Follow
Feb 6
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
#
cybersecurity
#
infosec
#
threatintel
#
iran
Comments
Add Comment
1 min read
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]
Mark0
Mark0
Mark0
Follow
Feb 3
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]
#
cybersecurity
#
infosec
#
malware
#
notepad
Comments
Add Comment
1 min read
DynoWiper update: Technical analysis and attribution
Mark0
Mark0
Mark0
Follow
Feb 2
DynoWiper update: Technical analysis and attribution
#
cybersecurity
#
infosec
#
malware
#
sandworm
Comments
Add Comment
1 min read
This month in security with Tony Anscombe – January 2026 edition
Mark0
Mark0
Mark0
Follow
Feb 2
This month in security with Tony Anscombe – January 2026 edition
#
cybersecurity
#
infosec
#
vulnerability
#
ai
Comments
Add Comment
1 min read
How Agentic Tool Chain Attacks Threaten AI Agent Security
Mark0
Mark0
Mark0
Follow
Feb 2
How Agentic Tool Chain Attacks Threaten AI Agent Security
#
cybersecurity
#
infosec
#
ai
#
security
Comments
Add Comment
1 min read
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
Mark0
Mark0
Mark0
Follow
Feb 2
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
#
cybersecurity
#
infosec
#
smartermail
#
vulnerability
Comments
Add Comment
1 min read
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Mark0
Mark0
Mark0
Follow
Feb 2
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
#
cybersecurity
#
infosec
#
malware
#
server
Comments
Add Comment
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 5
Mark0
Mark0
Mark0
Follow
Feb 2
The Good, the Bad and the Ugly in Cybersecurity – Week 5
#
news
#
cybersecurity
#
infosec
#
vulnerability
Comments
Add Comment
1 min read
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
Mark0
Mark0
Mark0
Follow
Feb 2
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
#
cybersecurity
#
infosec
#
ai
#
vulnerability
Comments
Add Comment
1 min read
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529
Mark0
Mark0
Mark0
Follow
Feb 2
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529
Comments
Add Comment
1 min read
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
Mark0
Mark0
Mark0
Follow
Feb 2
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
#
cybersecurity
#
infosec
#
cloud
#
vishing
Comments
Add Comment
1 min read
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
Mark0
Mark0
Mark0
Follow
Feb 2
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
#
cybersecurity
#
infosec
#
mandiant
#
cloudsecurity
Comments
Add Comment
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions
Mark0
Mark0
Mark0
Follow
Jan 30
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions
#
cybersecurity
#
infosec
#
socialengineering
#
microsoft365
Comments
Add Comment
1 min read
LDAP Channel Binding and LDAP Signing
Mark0
Mark0
Mark0
Follow
Jan 30
LDAP Channel Binding and LDAP Signing
#
cybersecurity
#
infosec
#
activedirectory
#
ldap
Comments
Add Comment
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic
#
cybersecurity
#
infosec
#
malware
#
networksecurity
Comments
Add Comment
1 min read
2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT
#
cybersecurity
#
infosec
#
malware
#
remcosrat
Comments
Add Comment
1 min read
2026-01-29: njRAT infection with MassLogger
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-29: njRAT infection with MassLogger
#
cybersecurity
#
infosec
#
malware
#
njrat
Comments
Add Comment
1 min read
Dissecting UAT-8099: New persistence mechanisms and regional focus
Mark0
Mark0
Mark0
Follow
Jan 30
Dissecting UAT-8099: New persistence mechanisms and regional focus
#
cybersecurity
#
infosec
#
malware
#
threatintel
Comments
Add Comment
1 min read
Microsoft releases update to address zero-day vulnerability in Microsoft Office
Mark0
Mark0
Mark0
Follow
Jan 30
Microsoft releases update to address zero-day vulnerability in Microsoft Office
#
cybersecurity
#
infosec
#
microsoft
#
vulnerability
Comments
Add Comment
1 min read
Supply chain attack on eScan antivirus: detecting and remediating malicious updates
Mark0
Mark0
Mark0
Follow
Jan 30
Supply chain attack on eScan antivirus: detecting and remediating malicious updates
#
cybersecurity
#
infosec
#
malware
#
supplychain
Comments
Add Comment
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Mark0
Mark0
Mark0
Follow
Jan 30
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
#
cybersecurity
#
infosec
#
javascript
#
vulnerability
Comments
Add Comment
1 min read
Understanding the Russian Cyber Threat to the 2026 Winter Olympics
Mark0
Mark0
Mark0
Follow
Jan 30
Understanding the Russian Cyber Threat to the 2026 Winter Olympics
#
cybersecurity
#
infosec
#
threatintelligence
#
russia
Comments
Add Comment
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware
Mark0
Mark0
Mark0
Follow
Jan 30
2026-01-20: Lumma Stealer infection with follow-up malware
#
cybersecurity
#
infosec
#
malware
#
lumma
Comments
Add Comment
1 min read
Google disrupts IPIDEA residential proxy networks fueled by malware
Mark0
Mark0
Mark0
Follow
Jan 30
Google disrupts IPIDEA residential proxy networks fueled by malware
#
cybersecurity
#
infosec
#
google
#
botnet
Comments
Add Comment
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Mark0
Mark0
Mark0
Follow
Jan 30
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
#
cybersecurity
#
infosec
#
vulnerability
#
n8n
Comments
Add Comment
1 min read
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
Mark0
Mark0
Mark0
Follow
Jan 30
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
#
cybersecurity
#
infosec
#
vulnerability
#
solarwinds
Comments
Add Comment
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
Mark0
Mark0
Mark0
Follow
Jan 30
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
#
cybersecurity
#
infosec
#
networksecurity
#
googlecloud
Comments
Add Comment
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
Mark0
Mark0
Mark0
Follow
Jan 30
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
#
cybersecurity
#
infosec
#
malware
#
winrar
Comments
Add Comment
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance
Mark0
Mark0
Mark0
Follow
Jan 29
How Elastic Infosec Optimizes Defend for Cost and Performance
#
cybersecurity
#
infosec
#
elasticsearch
#
monitoring
Comments
Add Comment
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing
Mark0
Mark0
Mark0
Follow
Jan 29
The key of AI: How Agentic Tuning can make your detection strategy sing
Comments
Add Comment
1 min read
Cyber Security Report 2026
Mark0
Mark0
Mark0
Follow
Jan 29
Cyber Security Report 2026
#
cybersecurity
#
infosec
#
ai
#
threatintel
Comments
Add Comment
1 min read
Drowning in spam or scam emails? Here’s probably why
Mark0
Mark0
Mark0
Follow
Jan 29
Drowning in spam or scam emails? Here’s probably why
Comments
Add Comment
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
Mark0
Mark0
Mark0
Follow
Jan 29
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
#
cybersecurity
#
infosec
#
malware
#
honeymyte
Comments
Add Comment
1 min read
Data Protection Day 2026: From Compliance to Resilience
Mark0
Mark0
Mark0
Follow
Jan 29
Data Protection Day 2026: From Compliance to Resilience
#
cybersecurity
#
infosec
#
privacy
#
ai
Comments
Add Comment
1 min read
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Mark0
Mark0
Mark0
Follow
Jan 29
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
#
cybersecurity
#
infosec
#
vulnerability
#
cloud
Comments
Add Comment
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware
Mark0
Mark0
Mark0
Follow
Jan 29
2026-01-20: Lumma Stealer infection with follow-up malware
#
cybersecurity
#
infosec
#
malware
#
analysis
Comments
Add Comment
1 min read
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready
Mark0
Mark0
Mark0
Follow
Jan 29
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready
#
cybersecurity
#
infosec
#
fortinet
#
zeroday
Comments
Add Comment
1 min read
SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws
Mark0
Mark0
Mark0
Follow
Jan 29
SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws
#
cybersecurity
#
infosec
#
solarwinds
#
vulnerability
Comments
Add Comment
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Mark0
Mark0
Mark0
Follow
Jan 29
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
#
cybersecurity
#
infosec
#
vulnerability
#
automation
Comments
Add Comment
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
Mark0
Mark0
Mark0
Follow
Jan 29
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
#
cybersecurity
#
infosec
#
googlecloud
#
threatintelligence
Comments
Add Comment
1 min read
Bypassing Windows Administrator Protection
Mark0
Mark0
Mark0
Follow
Jan 29
Bypassing Windows Administrator Protection
Comments
Add Comment
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
Mark0
Mark0
Mark0
Follow
Jan 29
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
#
cybersecurity
#
infosec
#
malware
#
winrar
Comments
Add Comment
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance
Mark0
Mark0
Mark0
Follow
Jan 28
How Elastic Infosec Optimizes Defend for Cost and Performance
#
cybersecurity
#
infosec
#
performance
#
elastic
Comments
Add Comment
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing
Mark0
Mark0
Mark0
Follow
Jan 28
The key of AI: How Agentic Tuning can make your detection strategy sing
#
cybersecurity
#
infosec
#
ai
#
threatdetection
Comments
Add Comment
1 min read
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups
Mark0
Mark0
Mark0
Follow
Jan 28
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups
#
cybersecurity
#
infosec
#
malware
#
jscript
Comments
Add Comment
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
Mark0
Mark0
Mark0
Follow
Jan 28
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns
#
cybersecurity
#
infosec
#
malware
#
honeymyte
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account