close

DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

Comments
1 min read
Benchmarking Self-Hosted LLMs for Offensive Security

Benchmarking Self-Hosted LLMs for Offensive Security

Comments
1 min read
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Comments
1 min read
State-sponsored threats: Different objectives, similar access paths

State-sponsored threats: Different objectives, similar access paths

Comments
1 min read
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities

Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities

Comments
1 min read
SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS

SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS

Comments
1 min read
JanelaRAT: a financial threat targeting users in Latin America

JanelaRAT: a financial threat targeting users in Latin America

Comments
1 min read
2026-04-13: XLoader (Formbook) infection

2026-04-13: XLoader (Formbook) infection

Comments
1 min read
New: Use response actions to update Zscaler policies and block threats

New: Use response actions to update Zscaler policies and block threats

Comments
1 min read
Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack

Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack

Comments
1 min read
Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Comments
1 min read
⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

Comments
1 min read
5 Ways Zero Trust Maximizes Identity Security

5 Ways Zero Trust Maximizes Identity Security

Comments
1 min read
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Comments
1 min read
13th April – Threat Intelligence Report

13th April – Threat Intelligence Report

Comments
1 min read
JanelaRAT: a financial threat targeting users in Latin America

JanelaRAT: a financial threat targeting users in Latin America

Comments
1 min read
On Anthropic’s Mythos Preview and Project Glasswing

On Anthropic’s Mythos Preview and Project Glasswing

Comments
1 min read
Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Comments
1 min read
Siemens Healthineers with Special Guest Javier Azofra Ovejero

Siemens Healthineers with Special Guest Javier Azofra Ovejero

Comments
1 min read
[Video] The TTP Ep. 22: The Collapse of the Patch Window

[Video] The TTP Ep. 22: The Collapse of the Patch Window

Comments
1 min read
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Comments
1 min read
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Comments
1 min read
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Comments
1 min read
Critical Marimo pre-auth RCE flaw now under active exploitation

Critical Marimo pre-auth RCE flaw now under active exploitation

Comments
1 min read
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Comments
1 min read
[local] NetBT e-Fatura - Privilege Escalation

[local] NetBT e-Fatura - Privilege Escalation

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Comments
1 min read
Crystal Mask

Crystal Mask

Comments
1 min read
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Comments
1 min read
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Comments
1 min read
Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

Comments
1 min read
Getting Started In Pentesting – Advice From The BHIS Pentest Lead

Getting Started In Pentesting – Advice From The BHIS Pentest Lead

Comments
1 min read
2026-04-06: SmartApeSG activity

2026-04-06: SmartApeSG activity

Comments
1 min read
AI in cybersecurity: The good, the bad, and the FUD

AI in cybersecurity: The good, the bad, and the FUD

Comments
1 min read
Year in Review: Vulnerabilities old and new and something React2

Year in Review: Vulnerabilities old and new and something React2

Comments
1 min read
New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations

New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations

Comments
1 min read
Financial cyberthreats in 2025 and the outlook for 2026

Financial cyberthreats in 2025 and the outlook for 2026

Comments
1 min read
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Comments
1 min read
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

Comments
1 min read
Cracks in the Bedrock: Agent God Mode

Cracks in the Bedrock: Agent God Mode

Comments
1 min read
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Comments
1 min read
Building a Detection Foundation: Part 5 - Correlation in Practice

Building a Detection Foundation: Part 5 - Correlation in Practice

Comments
1 min read
Cybersecurity in the Age of Instant Software

Cybersecurity in the Age of Instant Software

Comments
1 min read
2026-04-06: SmartApeSG activity

2026-04-06: SmartApeSG activity

Comments
1 min read
As breakout time accelerates, prevention-first cybersecurity takes center stage

As breakout time accelerates, prevention-first cybersecurity takes center stage

Comments
1 min read
Understanding Current Threats to Kubernetes Environments

Understanding Current Threats to Kubernetes Environments

Comments
1 min read
How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed

How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed

Comments
1 min read
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do

Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do

Comments
1 min read
Year in Review: Vulnerabilities old and new and something React2

Year in Review: Vulnerabilities old and new and something React2

Comments
1 min read
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Comments
1 min read
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

Comments
1 min read
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Comments
1 min read
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Comments
1 min read
Building a Detection Foundation: Part 5 - Correlation in Practice

Building a Detection Foundation: Part 5 - Correlation in Practice

Comments
1 min read
Cybersecurity in the Age of Instant Software

Cybersecurity in the Age of Instant Software

Comments
1 min read
2026-04-06: SmartApeSG activity

2026-04-06: SmartApeSG activity

Comments
1 min read
6th April – Threat Intelligence Report

6th April – Threat Intelligence Report

Comments
1 min read
Understanding Current Threats to Kubernetes Environments

Understanding Current Threats to Kubernetes Environments

Comments
1 min read
[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass

[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass

Comments
1 min read
loading...