Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Follow
User actions
Mark0
404 bio not found
Joined
Joined on
Jan 9, 2026
More info about @mark0_617b45cda9782a
Post
727 posts published
Comment
0 comments written
Tag
0 tags followed
How to Identify and Exploit New Vulnerabilities
Mark0
Mark0
Mark0
Follow
May 14
How to Identify and Exploit New Vulnerabilities
#
cybersecurity
#
infosec
#
redteaming
#
reverseengineering
Comments
Add Comment
1 min read
Slamming the Door on Quick Assist Tech Support Scams and Abuse
Mark0
Mark0
Mark0
Follow
May 14
Slamming the Door on Quick Assist Tech Support Scams and Abuse
#
cybersecurity
#
infosec
#
socialengineering
#
quickassist
Comments
Add Comment
1 min read
Elastic Security MCP App: Interactive security operations inside your AI Tools
Mark0
Mark0
Mark0
Follow
May 14
Elastic Security MCP App: Interactive security operations inside your AI Tools
#
cybersecurity
#
infosec
#
elasticsearch
#
mcp
Comments
Add Comment
1 min read
The Convergence of Cloud Secrets & AI Risk
Mark0
Mark0
Mark0
Follow
May 14
The Convergence of Cloud Secrets & AI Risk
#
cybersecurity
#
infosec
#
cloud
#
ai
Comments
Add Comment
1 min read
Breaking things to keep them safe with Philippe Laulheret
Mark0
Mark0
Mark0
Follow
May 14
Breaking things to keep them safe with Philippe Laulheret
#
cybersecurity
#
infosec
#
security
#
career
Comments
Add Comment
1 min read
Eyes wide open: How to mitigate the security and privacy risks of smart glasses
Mark0
Mark0
Mark0
Follow
May 14
Eyes wide open: How to mitigate the security and privacy risks of smart glasses
#
cybersecurity
#
infosec
#
privacy
#
ai
Comments
Add Comment
1 min read
May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs
Mark0
Mark0
Mark0
Follow
May 14
May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs
Comments
Add Comment
1 min read
Falcon AIDR Detects Threats at the Prompt Layer in Kubernetes AI Applications
Mark0
Mark0
Mark0
Follow
May 14
Falcon AIDR Detects Threats at the Prompt Layer in Kubernetes AI Applications
Comments
Add Comment
1 min read
[webapps] glances 4.5.2 - command injection
Mark0
Mark0
Mark0
Follow
May 14
[webapps] glances 4.5.2 - command injection
Comments
Add Comment
1 min read
State of ransomware in 2026
Mark0
Mark0
Mark0
Follow
May 14
State of ransomware in 2026
#
cybersecurity
#
infosec
#
ransomware
#
cryptography
Comments
Add Comment
1 min read
2026-05-11: Google ad for Claude leads to macOS malware infection
Mark0
Mark0
Mark0
Follow
May 14
2026-05-11: Google ad for Claude leads to macOS malware infection
#
cybersecurity
#
infosec
#
macos
#
malware
Comments
Add Comment
1 min read
Investigating server compromises with cgroups: A Linux DFIR primer
Mark0
Mark0
Mark0
Follow
May 14
Investigating server compromises with cgroups: A Linux DFIR primer
#
cybersecurity
#
infosec
#
linux
#
cgroup
Comments
Add Comment
1 min read
Windows BitLocker zero-day gives access to protected drives, PoC released
Mark0
Mark0
Mark0
Follow
May 14
Windows BitLocker zero-day gives access to protected drives, PoC released
#
cybersecurity
#
infosec
#
windows
#
exploit
Comments
Add Comment
1 min read
New critical Exim mailer flaw allows remote code execution
Mark0
Mark0
Mark0
Follow
May 14
New critical Exim mailer flaw allows remote code execution
#
cybersecurity
#
infosec
#
linux
#
exploit
Comments
Add Comment
1 min read
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware
Mark0
Mark0
Mark0
Follow
May 14
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware
#
cybersecurity
#
infosec
#
ransomware
#
malware
Comments
Add Comment
1 min read
Copy.Fail Linux Vulnerability
Mark0
Mark0
Mark0
Follow
May 14
Copy.Fail Linux Vulnerability
#
cybersecurity
#
infosec
#
linux
#
kernel
Comments
Add Comment
1 min read
A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens
Mark0
Mark0
Mark0
Follow
May 14
A 0-click exploit chain for the Pixel 10: When a Door Closes, a Window Opens
#
cybersecurity
#
infosec
#
android
#
kernel
Comments
Add Comment
1 min read
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
Mark0
Mark0
Mark0
Follow
May 14
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
#
cybersecurity
#
infosec
#
ai
#
threatintelligence
Comments
Add Comment
1 min read
Slamming the Door on Quick Assist Tech Support Scams and Abuse
Mark0
Mark0
Mark0
Follow
May 13
Slamming the Door on Quick Assist Tech Support Scams and Abuse
#
cybersecurity
#
infosec
#
windows
#
security
Comments
Add Comment
1 min read
Elastic Security MCP App: Interactive security operations inside your AI Tools
Mark0
Mark0
Mark0
Follow
May 13
Elastic Security MCP App: Interactive security operations inside your AI Tools
#
cybersecurity
#
infosec
#
ai
#
elasticsearch
Comments
Add Comment
1 min read
Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities
Mark0
Mark0
Mark0
Follow
May 13
Microsoft Patch Tuesday for May 2026 — Snort rules and prominent vulnerabilities
#
cybersecurity
#
infosec
#
vulnerability
#
patchtuesday
Comments
Add Comment
1 min read
Eyes wide open: How to mitigate the security and privacy risks of smart glasses
Mark0
Mark0
Mark0
Follow
May 13
Eyes wide open: How to mitigate the security and privacy risks of smart glasses
#
cybersecurity
#
infosec
#
privacy
#
ai
Comments
Add Comment
1 min read
Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections
Mark0
Mark0
Mark0
Follow
May 13
Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections
#
cybersecurity
#
infosec
#
ai
#
threatdetection
Comments
Add Comment
1 min read
May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs
Mark0
Mark0
Mark0
Follow
May 13
May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs
#
cybersecurity
#
infosec
#
microsoft
#
vulnerability
Comments
Add Comment
1 min read
State of ransomware in 2026
Mark0
Mark0
Mark0
Follow
May 13
State of ransomware in 2026
#
cybersecurity
#
infosec
#
ransomware
#
cryptography
Comments
Add Comment
1 min read
2026-05-11: Google ad for Claude leads to macOS malware infection
Mark0
Mark0
Mark0
Follow
May 13
2026-05-11: Google ad for Claude leads to macOS malware infection
#
cybersecurity
#
infosec
#
malware
#
macos
Comments
Add Comment
1 min read
Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
Mark0
Mark0
Mark0
Follow
May 13
Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
Mark0
Mark0
Mark0
Follow
May 13
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
#
cybersecurity
#
infosec
#
android
#
malware
Comments
Add Comment
1 min read
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware
Mark0
Mark0
Mark0
Follow
May 13
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware
#
cybersecurity
#
infosec
#
malware
#
ransomware
Comments
Add Comment
1 min read
Copy.Fail Linux Vulnerability
Mark0
Mark0
Mark0
Follow
May 13
Copy.Fail Linux Vulnerability
Comments
Add Comment
1 min read
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
Mark0
Mark0
Mark0
Follow
May 13
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
JDownloader site hacked to replace installers with Python RAT malware
Mark0
Mark0
Mark0
Follow
May 12
JDownloader site hacked to replace installers with Python RAT malware
#
cybersecurity
#
infosec
#
malware
#
supplychain
Comments
Add Comment
1 min read
Google: Hackers used AI to develop zero-day exploit for web admin tool
Mark0
Mark0
Mark0
Follow
May 12
Google: Hackers used AI to develop zero-day exploit for web admin tool
#
cybersecurity
#
infosec
#
ai
#
exploit
Comments
Add Comment
1 min read
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware
Mark0
Mark0
Mark0
Follow
May 12
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware
#
cybersecurity
#
infosec
#
ransomware
#
malware
Comments
Add Comment
1 min read
TrickMo Android banker adopts TON blockchain for covert comms
Mark0
Mark0
Mark0
Follow
May 12
TrickMo Android banker adopts TON blockchain for covert comms
#
cybersecurity
#
infosec
#
android
#
malware
Comments
1
comment
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access
Mark0
Mark0
Mark0
Follow
May 12
The Accidental C2 - Exploring Dev Tunnels for Remote Access
#
cybersecurity
#
infosec
#
devtunnels
#
vscode
Comments
Add Comment
1 min read
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
Mark0
Mark0
Mark0
Follow
May 12
GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
#
cybersecurity
#
infosec
#
ai
#
threatintelligence
Comments
Add Comment
1 min read
2026-05-08: macOS Shub Stealer infection
Mark0
Mark0
Mark0
Follow
May 11
2026-05-08: macOS Shub Stealer infection
#
cybersecurity
#
infosec
#
macos
#
malware
Comments
Add Comment
1 min read
What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do
Mark0
Mark0
Mark0
Follow
May 11
What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do
#
cybersecurity
#
infosec
#
databreach
#
threatintel
Comments
Add Comment
1 min read
CVE-2025-68670: discovering an RCE vulnerability in xrdp
Mark0
Mark0
Mark0
Follow
May 11
CVE-2025-68670: discovering an RCE vulnerability in xrdp
#
cybersecurity
#
infosec
#
linux
#
rce
Comments
Add Comment
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 19
Mark0
Mark0
Mark0
Follow
May 11
The Good, the Bad and the Ugly in Cybersecurity – Week 19
#
cybersecurity
#
infosec
#
cloudsecurity
#
vulnerability
Comments
Add Comment
1 min read
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
Mark0
Mark0
Mark0
Follow
May 11
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
#
cybersecurity
#
infosec
#
linux
#
malware
Comments
Add Comment
1 min read
CISA gives feds four days to patch Ivanti flaw exploited as zero-day
Mark0
Mark0
Mark0
Follow
May 11
CISA gives feds four days to patch Ivanti flaw exploited as zero-day
#
cybersecurity
#
infosec
#
vulnerability
#
ivanti
Comments
Add Comment
1 min read
JDownloader site hacked to replace installers with Python RAT malware
Mark0
Mark0
Mark0
Follow
May 11
JDownloader site hacked to replace installers with Python RAT malware
#
cybersecurity
#
infosec
#
malware
#
supplychain
Comments
Add Comment
1 min read
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild
Mark0
Mark0
Mark0
Follow
May 11
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild
#
cybersecurity
#
infosec
#
linux
#
kernel
Comments
Add Comment
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access
Mark0
Mark0
Mark0
Follow
May 11
The Accidental C2 - Exploring Dev Tunnels for Remote Access
#
cybersecurity
#
infosec
#
redteam
#
devtunnels
Comments
Add Comment
2 min read
Spring cleaning your browser
Mark0
Mark0
Mark0
Follow
May 10
Spring cleaning your browser
#
cybersecurity
#
infosec
#
browser
#
websecurity
Comments
Add Comment
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 19
Mark0
Mark0
Mark0
Follow
May 10
The Good, the Bad and the Ugly in Cybersecurity – Week 19
#
cybersecurity
#
infosec
#
ransomware
#
vulnerability
Comments
Add Comment
1 min read
Ivanti warns of new EPMM flaw exploited in zero-day attacks
Mark0
Mark0
Mark0
Follow
May 10
Ivanti warns of new EPMM flaw exploited in zero-day attacks
#
cybersecurity
#
infosec
#
vulnerability
#
security
Comments
Add Comment
1 min read
CISA gives feds four days to patch Ivanti flaw exploited as zero-day
Mark0
Mark0
Mark0
Follow
May 10
CISA gives feds four days to patch Ivanti flaw exploited as zero-day
#
cybersecurity
#
infosec
#
vulnerability
#
ivanti
Comments
Add Comment
1 min read
JDownloader site hacked to replace installers with Python RAT malware
Mark0
Mark0
Mark0
Follow
May 10
JDownloader site hacked to replace installers with Python RAT malware
#
cybersecurity
#
infosec
#
malware
#
supplychain
Comments
Add Comment
1 min read
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild
Mark0
Mark0
Mark0
Follow
May 10
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild
#
cybersecurity
#
infosec
#
linux
#
vulnerability
Comments
Add Comment
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access
Mark0
Mark0
Mark0
Follow
May 10
The Accidental C2 - Exploring Dev Tunnels for Remote Access
#
cybersecurity
#
infosec
#
redteam
#
rust
Comments
Add Comment
1 min read
AI-generated hunting leads: The hunt starts before you ask the question
Mark0
Mark0
Mark0
Follow
May 7
AI-generated hunting leads: The hunt starts before you ask the question
#
cybersecurity
#
infosec
#
ai
#
threathunting
Comments
Add Comment
1 min read
Know who to watch before the incident finds you
Mark0
Mark0
Mark0
Follow
May 7
Know who to watch before the incident finds you
#
cybersecurity
#
infosec
#
monitoring
#
elasticsearch
Comments
Add Comment
1 min read
Elastic Workflows GA: automation where your security data already lives
Mark0
Mark0
Mark0
Follow
May 7
Elastic Workflows GA: automation where your security data already lives
#
cybersecurity
#
infosec
#
automation
#
elasticsearch
Comments
Add Comment
1 min read
TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook
Mark0
Mark0
Mark0
Follow
May 7
TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook
#
cybersecurity
#
infosec
#
malware
#
banking
Comments
Add Comment
1 min read
Red Canary CFP tracker: May 2026
Mark0
Mark0
Mark0
Follow
May 7
Red Canary CFP tracker: May 2026
#
cybersecurity
#
infosec
#
conference
#
research
Comments
Add Comment
1 min read
CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies
Mark0
Mark0
Mark0
Follow
May 7
CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies
#
cybersecurity
#
infosec
#
ai
#
threatintelligence
Comments
Add Comment
1 min read
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security
Mark0
Mark0
Mark0
Follow
May 7
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security
#
cybersecurity
#
infosec
#
aws
#
phishing
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account