Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Follow
User actions
Mark0
404 bio not found
Joined
Joined on
Jan 9, 2026
More info about @mark0_617b45cda9782a
Post
506 posts published
Comment
0 comments written
Tag
0 tags followed
Getting Started In Pentesting – Advice From The BHIS Pentest Lead
Mark0
Mark0
Mark0
Follow
Apr 9
Getting Started In Pentesting – Advice From The BHIS Pentest Lead
#
cybersecurity
#
infosec
#
pentest
#
career
Comments
Add Comment
1 min read
2026-04-06: SmartApeSG activity
Mark0
Mark0
Mark0
Follow
Apr 9
2026-04-06: SmartApeSG activity
#
cybersecurity
#
infosec
#
malware
#
threatintel
Comments
Add Comment
1 min read
AI in cybersecurity: The good, the bad, and the FUD
Mark0
Mark0
Mark0
Follow
Apr 9
AI in cybersecurity: The good, the bad, and the FUD
#
cybersecurity
#
infosec
#
ai
#
threatdetection
Comments
Add Comment
1 min read
Year in Review: Vulnerabilities old and new and something React2
Mark0
Mark0
Mark0
Follow
Apr 9
Year in Review: Vulnerabilities old and new and something React2
#
cybersecurity
#
infosec
#
threatintel
#
vulnerability
Comments
Add Comment
1 min read
New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations
Mark0
Mark0
Mark0
Follow
Apr 9
New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations
#
cybersecurity
#
infosec
#
malware
#
reverseengineering
Comments
Add Comment
1 min read
Financial cyberthreats in 2025 and the outlook for 2026
Mark0
Mark0
Mark0
Follow
Apr 9
Financial cyberthreats in 2025 and the outlook for 2026
#
cybersecurity
#
infosec
#
malware
#
banking
Comments
Add Comment
1 min read
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox
Mark0
Mark0
Mark0
Follow
Apr 9
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox
#
cybersecurity
#
infosec
#
aws
#
dnstunneling
Comments
Add Comment
1 min read
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs
Mark0
Mark0
Mark0
Follow
Apr 9
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs
#
cybersecurity
#
infosec
#
ai
#
automation
Comments
Add Comment
1 min read
Cracks in the Bedrock: Agent God Mode
Mark0
Mark0
Mark0
Follow
Apr 9
Cracks in the Bedrock: Agent God Mode
#
cybersecurity
#
infosec
#
aws
#
iam
Comments
Add Comment
1 min read
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
Mark0
Mark0
Mark0
Follow
Apr 9
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
#
cybersecurity
#
infosec
#
node
#
vulnerability
Comments
Add Comment
1 min read
Building a Detection Foundation: Part 5 - Correlation in Practice
Mark0
Mark0
Mark0
Follow
Apr 9
Building a Detection Foundation: Part 5 - Correlation in Practice
Comments
Add Comment
1 min read
Cybersecurity in the Age of Instant Software
Mark0
Mark0
Mark0
Follow
Apr 9
Cybersecurity in the Age of Instant Software
#
cybersecurity
#
infosec
#
ai
#
software
Comments
Add Comment
1 min read
2026-04-06: SmartApeSG activity
Mark0
Mark0
Mark0
Follow
Apr 8
2026-04-06: SmartApeSG activity
#
cybersecurity
#
infosec
#
malware
#
trafficanalysis
Comments
Add Comment
1 min read
As breakout time accelerates, prevention-first cybersecurity takes center stage
Mark0
Mark0
Mark0
Follow
Apr 8
As breakout time accelerates, prevention-first cybersecurity takes center stage
#
cybersecurity
#
infosec
#
ai
#
threatdetection
Comments
Add Comment
1 min read
Understanding Current Threats to Kubernetes Environments
Mark0
Mark0
Mark0
Follow
Apr 8
Understanding Current Threats to Kubernetes Environments
Comments
Add Comment
1 min read
How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed
Mark0
Mark0
Mark0
Follow
Apr 8
How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed
#
cybersecurity
#
infosec
#
cloud
#
vulnerability
Comments
Add Comment
1 min read
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do
Mark0
Mark0
Mark0
Follow
Apr 8
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do
#
cybersecurity
#
infosec
#
malware
#
supplychain
Comments
Add Comment
1 min read
Year in Review: Vulnerabilities old and new and something React2
Mark0
Mark0
Mark0
Follow
Apr 8
Year in Review: Vulnerabilities old and new and something React2
#
cybersecurity
#
infosec
#
threatintelligence
#
vulnerability
Comments
Add Comment
1 min read
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox
Mark0
Mark0
Mark0
Follow
Apr 8
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox
#
cybersecurity
#
infosec
#
aws
#
ai
Comments
Add Comment
1 min read
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins
Mark0
Mark0
Mark0
Follow
Apr 8
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins
#
cybersecurity
#
infosec
#
networksecurity
#
apt28
Comments
Add Comment
1 min read
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
Mark0
Mark0
Mark0
Follow
Apr 8
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
#
cybersecurity
#
infosec
#
security
#
advisory
Comments
Add Comment
1 min read
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
Mark0
Mark0
Mark0
Follow
Apr 8
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
#
cybersecurity
#
infosec
#
node
#
vulnerability
Comments
Add Comment
1 min read
Building a Detection Foundation: Part 5 - Correlation in Practice
Mark0
Mark0
Mark0
Follow
Apr 8
Building a Detection Foundation: Part 5 - Correlation in Practice
#
cybersecurity
#
infosec
#
windows
#
detection
Comments
Add Comment
1 min read
Cybersecurity in the Age of Instant Software
Mark0
Mark0
Mark0
Follow
Apr 8
Cybersecurity in the Age of Instant Software
#
cybersecurity
#
infosec
#
ai
#
automation
Comments
Add Comment
1 min read
2026-04-06: SmartApeSG activity
Mark0
Mark0
Mark0
Follow
Apr 7
2026-04-06: SmartApeSG activity
#
cybersecurity
#
infosec
#
malware
#
threatintelligence
Comments
Add Comment
1 min read
6th April – Threat Intelligence Report
Mark0
Mark0
Mark0
Follow
Apr 7
6th April – Threat Intelligence Report
#
cybersecurity
#
infosec
#
threatintelligence
#
vulnerability
Comments
Add Comment
1 min read
Understanding Current Threats to Kubernetes Environments
Mark0
Mark0
Mark0
Follow
Apr 7
Understanding Current Threats to Kubernetes Environments
#
cybersecurity
#
infosec
#
kubernetes
#
cloud
Comments
Add Comment
1 min read
[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass
Mark0
Mark0
Mark0
Follow
Apr 7
[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass
#
cybersecurity
#
infosec
#
vulnerability
#
networking
Comments
Add Comment
1 min read
Fortinet Issues Emergency Patch for FortiClient Zero-Day
Mark0
Mark0
Mark0
Follow
Apr 7
Fortinet Issues Emergency Patch for FortiClient Zero-Day
#
cybersecurity
#
infosec
#
vulnerability
#
fortinet
Comments
Add Comment
1 min read
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Mark0
Mark0
Mark0
Follow
Apr 7
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
#
cybersecurity
#
infosec
#
vulnerability
#
fortinet
Comments
Add Comment
1 min read
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
Mark0
Mark0
Mark0
Follow
Apr 7
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit
#
cybersecurity
#
infosec
#
windows
#
zeroday
Comments
Add Comment
1 min read
Elastic Security Integrations Roundup: Q1 2026
Mark0
Mark0
Mark0
Follow
Apr 6
Elastic Security Integrations Roundup: Q1 2026
#
cybersecurity
#
infosec
#
siem
#
elastic
Comments
Add Comment
1 min read
Axios NPM supply chain incident
Mark0
Mark0
Mark0
Follow
Apr 6
Axios NPM supply chain incident
#
cybersecurity
#
infosec
#
node
#
malware
Comments
Add Comment
1 min read
Do not get high(jacked) off your own supply (chain)
Mark0
Mark0
Mark0
Follow
Apr 6
Do not get high(jacked) off your own supply (chain)
#
cybersecurity
#
infosec
#
supplychain
#
vulnerability
Comments
Add Comment
1 min read
Axios npm hack used fake Teams error fix to hijack maintainer account
Mark0
Mark0
Mark0
Follow
Apr 6
Axios npm hack used fake Teams error fix to hijack maintainer account
#
cybersecurity
#
infosec
#
npm
#
malware
Comments
Add Comment
1 min read
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
Mark0
Mark0
Mark0
Follow
Apr 6
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
#
cybersecurity
#
infosec
#
ransomware
#
malware
Comments
Add Comment
1 min read
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Mark0
Mark0
Mark0
Follow
Apr 6
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
#
cybersecurity
#
infosec
#
networksecurity
#
vulnerability
Comments
Add Comment
1 min read
When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications
Mark0
Mark0
Mark0
Follow
Apr 6
When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications
#
cybersecurity
#
infosec
#
ai
#
bedrock
Comments
Add Comment
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 14
Mark0
Mark0
Mark0
Follow
Apr 6
The Good, the Bad and the Ugly in Cybersecurity – Week 14
#
cybersecurity
#
infosec
#
malware
#
webdev
Comments
Add Comment
1 min read
New Mouse in the House: Zero-Point Security Training Joins the Fortra Family
Mark0
Mark0
Mark0
Follow
Apr 5
New Mouse in the House: Zero-Point Security Training Joins the Fortra Family
#
cybersecurity
#
infosec
#
redteaming
#
training
Comments
Add Comment
1 min read
Elastic Security Integrations Roundup: Q1 2026
Mark0
Mark0
Mark0
Follow
Apr 5
Elastic Security Integrations Roundup: Q1 2026
#
cybersecurity
#
infosec
#
siem
#
elastic
Comments
Add Comment
1 min read
The Identity Paradox: The Hidden Risks in Your Valid Credentials
Mark0
Mark0
Mark0
Follow
Apr 5
The Identity Paradox: The Hidden Risks in Your Valid Credentials
#
cybersecurity
#
infosec
#
cloudsecurity
#
identity
Comments
Add Comment
1 min read
SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library
Mark0
Mark0
Mark0
Follow
Apr 5
SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library
#
cybersecurity
#
infosec
#
macos
#
vulnerability
Comments
Add Comment
1 min read
Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders
Mark0
Mark0
Mark0
Follow
Apr 5
Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders
#
cybersecurity
#
infosec
#
threatintelligence
#
ai
Comments
Add Comment
1 min read
Qilin EDR killer infection chain
Mark0
Mark0
Mark0
Follow
Apr 5
Qilin EDR killer infection chain
#
cybersecurity
#
infosec
#
malware
#
ransomware
Comments
Add Comment
1 min read
Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously
Mark0
Mark0
Mark0
Follow
Apr 5
Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously
#
cybersecurity
#
infosec
#
malware
#
npm
Comments
Add Comment
1 min read
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Mark0
Mark0
Mark0
Follow
Apr 5
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
#
cybersecurity
#
infosec
#
vulnerability
#
fortinet
Comments
Add Comment
1 min read
Claude Code leak used to push infostealer malware on GitHub
Mark0
Mark0
Mark0
Follow
Apr 5
Claude Code leak used to push infostealer malware on GitHub
#
cybersecurity
#
infosec
#
malware
#
github
Comments
Add Comment
1 min read
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
Mark0
Mark0
Mark0
Follow
Apr 5
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
#
cybersecurity
#
infosec
#
malware
#
github
Comments
Add Comment
1 min read
When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications
Mark0
Mark0
Mark0
Follow
Apr 5
When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications
Comments
Add Comment
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 14
Mark0
Mark0
Mark0
Follow
Apr 5
The Good, the Bad and the Ugly in Cybersecurity – Week 14
#
cybersecurity
#
infosec
#
security
#
malware
Comments
Add Comment
1 min read
Possible US Government iPhone Hacking Tool Leaked
Mark0
Mark0
Mark0
Follow
Apr 5
Possible US Government iPhone Hacking Tool Leaked
#
cybersecurity
#
infosec
#
ios
#
hacking
Comments
Add Comment
1 min read
vSphere and BRICKSTORM Malware: A Defender's Guide
Mark0
Mark0
Mark0
Follow
Apr 5
vSphere and BRICKSTORM Malware: A Defender's Guide
#
cybersecurity
#
infosec
#
vmware
#
malware
Comments
Add Comment
1 min read
Overview of Content Published in March
Mark0
Mark0
Mark0
Follow
Apr 2
Overview of Content Published in March
#
cybersecurity
#
infosec
#
forensics
#
python
Comments
Add Comment
1 min read
Prioritizing Alerts Triage with Higher-Order Detection Rules
Mark0
Mark0
Mark0
Follow
Apr 2
Prioritizing Alerts Triage with Higher-Order Detection Rules
#
cybersecurity
#
infosec
#
elasticsearch
#
siem
Comments
Add Comment
1 min read
Red Canary CFP tracker: April 2026
Mark0
Mark0
Mark0
Follow
Apr 2
Red Canary CFP tracker: April 2026
#
cybersecurity
#
infosec
#
conference
#
cfp
Comments
Add Comment
1 min read
The Implementation Blind Spot | Why Organizations Are Confusing Temporary Friction with Permanent Safety
Mark0
Mark0
Mark0
Follow
Apr 2
The Implementation Blind Spot | Why Organizations Are Confusing Temporary Friction with Permanent Safety
#
cybersecurity
#
infosec
#
ai
#
automation
Comments
Add Comment
1 min read
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
Mark0
Mark0
Mark0
Follow
Apr 2
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
#
cybersecurity
#
infosec
#
malware
#
crystalx
Comments
Add Comment
1 min read
Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse
Mark0
Mark0
Mark0
Follow
Apr 2
Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse
#
cybersecurity
#
infosec
#
kerberos
#
activedirectory
Comments
Add Comment
1 min read
Threat Brief: Widespread Impact of the Axios Supply Chain Attack
Mark0
Mark0
Mark0
Follow
Apr 2
Threat Brief: Widespread Impact of the Axios Supply Chain Attack
#
cybersecurity
#
infosec
#
javascript
#
malware
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account