DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
How to Identify and Exploit New Vulnerabilities

How to Identify and Exploit New Vulnerabilities

Comments
1 min read
Slamming the Door on Quick Assist Tech Support Scams and Abuse

Slamming the Door on Quick Assist Tech Support Scams and Abuse

Comments
1 min read
Elastic Security MCP App: Interactive security operations inside your AI Tools

Elastic Security MCP App: Interactive security operations inside your AI Tools

Comments
1 min read
The Convergence of Cloud Secrets & AI Risk

The Convergence of Cloud Secrets & AI Risk

Comments
1 min read
Breaking things to keep them safe with Philippe Laulheret

Breaking things to keep them safe with Philippe Laulheret

Comments
1 min read
Eyes wide open: How to mitigate the security and privacy risks of smart glasses

Eyes wide open: How to mitigate the security and privacy risks of smart glasses

Comments
1 min read
May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs

May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs

Comments
1 min read
Falcon AIDR Detects Threats at the Prompt Layer in Kubernetes AI Applications

Falcon AIDR Detects Threats at the Prompt Layer in Kubernetes AI Applications

Comments
1 min read
[webapps] glances 4.5.2 - command injection

[webapps] glances 4.5.2 - command injection

Comments
1 min read
State of ransomware in 2026

State of ransomware in 2026

Comments
1 min read
2026-05-11: Google ad for Claude leads to macOS malware infection

2026-05-11: Google ad for Claude leads to macOS malware infection

Comments
1 min read
Investigating server compromises with cgroups: A Linux DFIR primer

Investigating server compromises with cgroups: A Linux DFIR primer

Comments
1 min read
Windows BitLocker zero-day gives access to protected drives, PoC released

Windows BitLocker zero-day gives access to protected drives, PoC released

Comments
1 min read
New critical Exim mailer flaw allows remote code execution

New critical Exim mailer flaw allows remote code execution

Comments
1 min read
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware

Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware

Comments
1 min read
Copy.Fail Linux Vulnerability

Copy.Fail Linux Vulnerability

Comments
1 min read
A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens

A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens

Comments
1 min read
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

Comments
1 min read
Slamming the Door on Quick Assist Tech Support Scams and Abuse

Slamming the Door on Quick Assist Tech Support Scams and Abuse

Comments
1 min read
Elastic Security MCP App: Interactive security operations inside your AI Tools

Elastic Security MCP App: Interactive security operations inside your AI Tools

Comments
1 min read
Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities

Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities

Comments
1 min read
Eyes wide open: How to mitigate the security and privacy risks of smart glasses

Eyes wide open: How to mitigate the security and privacy risks of smart glasses

Comments
1 min read
Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections

Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections

Comments
1 min read
May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs

May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs

Comments
1 min read
State of ransomware in 2026

State of ransomware in 2026

Comments
1 min read
2026-05-11: Google ad for Claude leads to macOS malware infection

2026-05-11: Google ad for Claude leads to macOS malware infection

Comments
1 min read
Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

Comments
1 min read
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

Comments
1 min read
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware

Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware

Comments
1 min read
Copy.Fail Linux Vulnerability

Copy.Fail Linux Vulnerability

Comments
1 min read
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

Comments
1 min read
JDownloader site hacked to replace installers with Python RAT malware

JDownloader site hacked to replace installers with Python RAT malware

Comments
1 min read
Google: Hackers used AI to develop zero-day exploit for web admin tool

Google: Hackers used AI to develop zero-day exploit for web admin tool

Comments
1 min read
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware

Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware

Comments
1 min read
TrickMo Android banker adopts TON blockchain for covert comms

TrickMo Android banker adopts TON blockchain for covert comms

Comments 1
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access

The Accidental C2 - Exploring Dev Tunnels for Remote Access

Comments
1 min read
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access

Comments
1 min read
2026-05-08: macOS Shub Stealer infection

2026-05-08: macOS Shub Stealer infection

Comments
1 min read
What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do

What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do

Comments
1 min read
CVE-2025-68670: discovering an RCE vulnerability in xrdp

CVE-2025-68670: discovering an RCE vulnerability in xrdp

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 19

The Good, the Bad and the Ugly in Cybersecurity – Week 19

Comments
1 min read
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

Comments
1 min read
CISA gives feds four days to patch Ivanti flaw exploited as zero-day

CISA gives feds four days to patch Ivanti flaw exploited as zero-day

Comments
1 min read
JDownloader site hacked to replace installers with Python RAT malware

JDownloader site hacked to replace installers with Python RAT malware

Comments
1 min read
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Comments
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access

The Accidental C2 - Exploring Dev Tunnels for Remote Access

Comments
2 min read
Spring cleaning your browser

Spring cleaning your browser

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 19

The Good, the Bad and the Ugly in Cybersecurity – Week 19

Comments
1 min read
Ivanti warns of new EPMM flaw exploited in zero-day attacks

Ivanti warns of new EPMM flaw exploited in zero-day attacks

Comments
1 min read
CISA gives feds four days to patch Ivanti flaw exploited as zero-day

CISA gives feds four days to patch Ivanti flaw exploited as zero-day

Comments
1 min read
JDownloader site hacked to replace installers with Python RAT malware

JDownloader site hacked to replace installers with Python RAT malware

Comments
1 min read
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Comments
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access

The Accidental C2 - Exploring Dev Tunnels for Remote Access

Comments
1 min read
AI-generated hunting leads: The hunt starts before you ask the question

AI-generated hunting leads: The hunt starts before you ask the question

Comments
1 min read
Know who to watch before the incident finds you

Know who to watch before the incident finds you

Comments
1 min read
Elastic Workflows GA: automation where your security data already lives

Elastic Workflows GA: automation where your security data already lives

Comments
1 min read
TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

Comments
1 min read
Red Canary CFP tracker: May 2026

Red Canary CFP tracker: May 2026

Comments
1 min read
CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies

CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies

Comments
1 min read
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security

“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security

Comments
1 min read
loading...