DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
When the SOC Goes to Deadwood: A Night to Remember 

When the SOC Goes to Deadwood: A Night to Remember 

Comments
1 min read
MCP in Burp Suite: From Enumeration to Targeted Exploitation

MCP in Burp Suite: From Enumeration to Targeted Exploitation

Comments
1 min read
The Engineer's Guide to Elastic Detections as Code

The Engineer's Guide to Elastic Detections as Code

Comments
1 min read
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test

CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test

Comments
1 min read
What Security Teams Need to Know About OpenClaw, the AI Super Agent

What Security Teams Need to Know About OpenClaw, the AI Super Agent

Comments
1 min read
OfferUp scammers are out in force: Here’s what you should know

OfferUp scammers are out in force: Here’s what you should know

Comments
1 min read
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs

The Notepad++ supply chain attack — unnoticed execution chains and new IoCs

Comments
1 min read
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT

Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT

Comments
1 min read
[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

Comments
1 min read
DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector

DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector

Comments
1 min read
Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive

Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive

Comments
1 min read
EDR killer tool uses signed kernel driver from forensic software

EDR killer tool uses signed kernel driver from forensic software

Comments
1 min read
2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration

2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration

Comments
1 min read
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

Comments
1 min read
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis

Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis

Comments
1 min read
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]

Comments
1 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
This month in security with Tony Anscombe – January 2026 edition

This month in security with Tony Anscombe – January 2026 edition

Comments
1 min read
How Agentic Tool Chain Attacks Threaten AI Agent Security

How Agentic Tool Chain Attacks Threaten AI Agent Security

Comments
1 min read
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

Comments
1 min read
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 5

The Good, the Bad and the Ugly in Cybersecurity – Week 5

Comments
1 min read
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

Comments
1 min read
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

Comments
1 min read
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Comments
1 min read
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS

Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS

Comments
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Comments
1 min read
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT

2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT

Comments
1 min read
2026-01-29: njRAT infection with MassLogger

2026-01-29: njRAT infection with MassLogger

Comments
1 min read
Dissecting UAT-8099: New persistence mechanisms and regional focus

Dissecting UAT-8099: New persistence mechanisms and regional focus

Comments
1 min read
Microsoft releases update to address zero-day vulnerability in Microsoft Office

Microsoft releases update to address zero-day vulnerability in Microsoft Office

Comments
1 min read
Supply chain attack on eScan antivirus: detecting and remediating malicious updates

Supply chain attack on eScan antivirus: detecting and remediating malicious updates

Comments
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Comments
1 min read
Understanding the Russian Cyber Threat to the 2026 Winter Olympics

Understanding the Russian Cyber Threat to the 2026 Winter Olympics

Comments
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware

2026-01-20: Lumma Stealer infection with follow-up malware

Comments
1 min read
Google disrupts IPIDEA residential proxy networks fueled by malware

Google disrupts IPIDEA residential proxy networks fueled by malware

Comments
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Comments
1 min read
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

Comments
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance

How Elastic Infosec Optimizes Defend for Cost and Performance

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
Cyber Security Report 2026

Cyber Security Report 2026

Comments
1 min read
Drowning in spam or scam emails? Here’s probably why

Drowning in spam or scam emails? Here’s probably why

Comments
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

Comments
1 min read
Data Protection Day 2026: From Compliance to Resilience

Data Protection Day 2026: From Compliance to Resilience

Comments
1 min read
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Comments
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware

2026-01-20: Lumma Stealer infection with follow-up malware

Comments
1 min read
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Comments
1 min read
SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

Comments
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Comments
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Comments
1 min read
Bypassing Windows Administrator Protection

Bypassing Windows Administrator Protection

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance

How Elastic Infosec Optimizes Defend for Cost and Performance

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

Comments
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

Comments
1 min read
loading...