Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Follow
User actions
Mark0
404 bio not found
Joined
Joined on
Jan 9, 2026
More info about @mark0_617b45cda9782a
Post
408 posts published
Comment
0 comments written
Tag
0 tags followed
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario
Mark0
Mark0
Mark0
Follow
Mar 22
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario
#
cybersecurity
#
infosec
#
kubernetes
#
containers
Comments
Add Comment
1 min read
Intelligence Insights: March 2026
Mark0
Mark0
Mark0
Follow
Mar 22
Intelligence Insights: March 2026
#
cybersecurity
#
infosec
#
threatintelligence
#
malware
Comments
Add Comment
1 min read
Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown
Mark0
Mark0
Mark0
Follow
Mar 22
Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown
#
cybersecurity
#
infosec
#
threatintelligence
#
phishing
Comments
Add Comment
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS
Mark0
Mark0
Mark0
Follow
Mar 22
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS
#
cybersecurity
#
infosec
#
macos
#
vulnerability
Comments
Add Comment
1 min read
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
Mark0
Mark0
Mark0
Follow
Mar 22
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
#
cybersecurity
#
infosec
#
detection
#
exfiltration
Comments
Add Comment
1 min read
You have to invite them in
Mark0
Mark0
Mark0
Follow
Mar 22
You have to invite them in
#
cybersecurity
#
infosec
#
identity
#
threatintelligence
1
reaction
Comments
Add Comment
1 min read
EDR killers explained: Beyond the drivers
Mark0
Mark0
Mark0
Follow
Mar 22
EDR killers explained: Beyond the drivers
#
cybersecurity
#
infosec
#
malware
#
ransomware
Comments
Add Comment
1 min read
Analyzing the Current State of AI Use in Malware
Mark0
Mark0
Mark0
Follow
Mar 22
Analyzing the Current State of AI Use in Malware
#
cybersecurity
#
infosec
#
malware
#
ai
Comments
Add Comment
1 min read
Who’s Really Shopping? Retail Fraud in the Age of Agentic AI
Mark0
Mark0
Mark0
Follow
Mar 22
Who’s Really Shopping? Retail Fraud in the Age of Agentic AI
#
cybersecurity
#
infosec
#
ai
#
fraud
Comments
Add Comment
1 min read
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
Mark0
Mark0
Mark0
Follow
Mar 22
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
#
cybersecurity
#
infosec
#
oracle
#
vulnerability
Comments
Add Comment
1 min read
Oracle pushes emergency fix for critical Identity Manager RCE flaw
Mark0
Mark0
Mark0
Follow
Mar 22
Oracle pushes emergency fix for critical Identity Manager RCE flaw
#
cybersecurity
#
infosec
#
oracle
#
rce
Comments
Add Comment
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 12
Mark0
Mark0
Mark0
Follow
Mar 22
The Good, the Bad and the Ugly in Cybersecurity – Week 12
#
cybersecurity
#
infosec
#
malware
#
vulnerability
Comments
Add Comment
1 min read
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
Mark0
Mark0
Mark0
Follow
Mar 22
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
#
cybersecurity
#
infosec
#
github
#
malware
Comments
Add Comment
1 min read
How to Lead Effective Tabletops
Mark0
Mark0
Mark0
Follow
Mar 20
How to Lead Effective Tabletops
#
cybersecurity
#
infosec
#
tabletop
#
incidentresponse
Comments
Add Comment
1 min read
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)
Mark0
Mark0
Mark0
Follow
Mar 20
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)
#
cybersecurity
#
infosec
#
malware
#
remcosrat
Comments
Add Comment
1 min read
2026-03-17: Seven days of scans and probes and web traffic hitting my web server
Mark0
Mark0
Mark0
Follow
Mar 20
2026-03-17: Seven days of scans and probes and web traffic hitting my web server
#
cybersecurity
#
infosec
#
networksecurity
#
pcap
Comments
Add Comment
1 min read
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario
Mark0
Mark0
Mark0
Follow
Mar 20
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario
#
cybersecurity
#
infosec
#
kubernetes
#
cloudnative
Comments
Add Comment
1 min read
AI and browser threats stand out in the 2026 Threat Detection Report
Mark0
Mark0
Mark0
Follow
Mar 20
AI and browser threats stand out in the 2026 Threat Detection Report
#
cybersecurity
#
infosec
#
threatintelligence
#
cloudsecurity
Comments
Add Comment
1 min read
Intelligence Insights: March 2026
Mark0
Mark0
Mark0
Follow
Mar 20
Intelligence Insights: March 2026
#
cybersecurity
#
infosec
#
malware
#
threatintel
Comments
Add Comment
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS
Mark0
Mark0
Mark0
Follow
Mar 20
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS
#
cybersecurity
#
infosec
#
macos
#
vulnerability
Comments
Add Comment
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models
Mark0
Mark0
Mark0
Follow
Mar 20
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models
#
cybersecurity
#
infosec
#
ai
#
fuzzing
Comments
Add Comment
1 min read
Analyzing the Current State of AI Use in Malware
Mark0
Mark0
Mark0
Follow
Mar 20
Analyzing the Current State of AI Use in Malware
#
cybersecurity
#
infosec
#
malware
#
ai
Comments
Add Comment
1 min read
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect
Mark0
Mark0
Mark0
Follow
Mar 20
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect
#
cybersecurity
#
infosec
#
malware
#
silentconnect
Comments
Add Comment
1 min read
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)
Mark0
Mark0
Mark0
Follow
Mar 20
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)
#
cybersecurity
#
infosec
#
kubernetes
#
linux
Comments
Add Comment
1 min read
Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found
Mark0
Mark0
Mark0
Follow
Mar 20
Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found
#
cybersecurity
#
infosec
#
azure
#
cloud
Comments
Add Comment
1 min read
ConnectWise patches new flaw allowing ScreenConnect hijacking
Mark0
Mark0
Mark0
Follow
Mar 20
ConnectWise patches new flaw allowing ScreenConnect hijacking
#
cybersecurity
#
infosec
#
vulnerability
#
connectwise
Comments
Add Comment
1 min read
Why East-West Visibility Matters for Grid Security
Mark0
Mark0
Mark0
Follow
Mar 20
Why East-West Visibility Matters for Grid Security
#
cybersecurity
#
infosec
#
otsecurity
#
infrastructure
Comments
Add Comment
1 min read
Transparent COM instrumentation for malware analysis
Mark0
Mark0
Mark0
Follow
Mar 20
Transparent COM instrumentation for malware analysis
#
cybersecurity
#
infosec
#
malware
#
windows
Comments
Add Comment
1 min read
C2 Implant 'SnappyClient' Targets Crypto Wallets
Mark0
Mark0
Mark0
Follow
Mar 20
C2 Implant 'SnappyClient' Targets Crypto Wallets
#
cybersecurity
#
infosec
#
malware
#
c2
Comments
Add Comment
1 min read
Ransomware gang exploits Cisco flaw in zero-day attacks since January
Mark0
Mark0
Mark0
Follow
Mar 20
Ransomware gang exploits Cisco flaw in zero-day attacks since January
#
cybersecurity
#
infosec
#
ransomware
#
cisco
1
reaction
Comments
Add Comment
1 min read
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA
Mark0
Mark0
Mark0
Follow
Mar 20
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA
#
cybersecurity
#
infosec
#
cloud
#
springboot
1
reaction
Comments
Add Comment
1 min read
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
Mark0
Mark0
Mark0
Follow
Mar 20
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
#
cybersecurity
#
infosec
#
ios
#
exploit
Comments
Add Comment
1 min read
How to Lead Effective Tabletops
Mark0
Mark0
Mark0
Follow
Mar 19
How to Lead Effective Tabletops
#
cybersecurity
#
infosec
#
incidentresponse
#
training
Comments
Add Comment
1 min read
Better Together: Combining Automation and Manual Testing
Mark0
Mark0
Mark0
Follow
Mar 19
Better Together: Combining Automation and Manual Testing
#
cybersecurity
#
infosec
#
mobile
#
pentesting
1
reaction
Comments
Add Comment
1 min read
Update: oledump.py Version 0.0.85
Mark0
Mark0
Mark0
Follow
Mar 19
Update: oledump.py Version 0.0.85
#
cybersecurity
#
infosec
#
malware
#
oledump
Comments
Add Comment
1 min read
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)
Mark0
Mark0
Mark0
Follow
Mar 19
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)
#
cybersecurity
#
infosec
#
malware
#
threatintel
1
reaction
Comments
Add Comment
1 min read
2026-03-17: Seven days of scans and probes and web traffic hitting my web server
Mark0
Mark0
Mark0
Follow
Mar 19
2026-03-17: Seven days of scans and probes and web traffic hitting my web server
#
cybersecurity
#
infosec
#
networking
#
pcap
Comments
Add Comment
1 min read
AI and browser threats stand out in the 2026 Threat Detection Report
Mark0
Mark0
Mark0
Follow
Mar 19
AI and browser threats stand out in the 2026 Threat Detection Report
#
cybersecurity
#
infosec
#
threatintelligence
#
cloudsecurity
Comments
Add Comment
1 min read
UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection
Mark0
Mark0
Mark0
Follow
Mar 19
UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection
#
cybersecurity
#
infosec
#
privacy
#
security
1
reaction
Comments
Add Comment
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models
Mark0
Mark0
Mark0
Follow
Mar 19
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models
#
cybersecurity
#
infosec
#
ai
#
promptinjection
Comments
Add Comment
1 min read
Get started with Elastic Security from your AI agent
Mark0
Mark0
Mark0
Follow
Mar 19
Get started with Elastic Security from your AI agent
#
cybersecurity
#
infosec
#
elastic
#
ai
Comments
Add Comment
1 min read
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect
Mark0
Mark0
Mark0
Follow
Mar 19
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect
#
cybersecurity
#
infosec
#
malware
#
silentconnect
Comments
Add Comment
1 min read
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)
Mark0
Mark0
Mark0
Follow
Mar 19
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)
#
cybersecurity
#
infosec
#
kubernetes
#
linux
Comments
Add Comment
1 min read
Why East-West Visibility Matters for Grid Security
Mark0
Mark0
Mark0
Follow
Mar 19
Why East-West Visibility Matters for Grid Security
#
cybersecurity
#
infosec
#
otsecurity
#
criticalinfrastructure
Comments
Add Comment
1 min read
Transparent COM instrumentation for malware analysis
Mark0
Mark0
Mark0
Follow
Mar 19
Transparent COM instrumentation for malware analysis
#
cybersecurity
#
infosec
#
malware
#
windows
Comments
Add Comment
1 min read
Ransomware gang exploits Cisco flaw in zero-day attacks since January
Mark0
Mark0
Mark0
Follow
Mar 19
Ransomware gang exploits Cisco flaw in zero-day attacks since January
#
cybersecurity
#
infosec
#
ransomware
#
cisco
1
reaction
Comments
Add Comment
1 min read
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
Mark0
Mark0
Mark0
Follow
Mar 19
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
#
cybersecurity
#
infosec
#
malware
#
websecurity
Comments
Add Comment
1 min read
LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks
Mark0
Mark0
Mark0
Follow
Mar 19
LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks
#
cybersecurity
#
infosec
#
ransomware
#
malware
Comments
Add Comment
1 min read
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA
Mark0
Mark0
Mark0
Follow
Mar 19
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA
#
cybersecurity
#
infosec
#
cloudsecurity
#
springboot
Comments
Add Comment
1 min read
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
Mark0
Mark0
Mark0
Follow
Mar 19
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
#
cybersecurity
#
infosec
#
apple
#
vulnerability
Comments
Add Comment
1 min read
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
Mark0
Mark0
Mark0
Follow
Mar 19
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
#
cybersecurity
#
infosec
#
ransomware
#
threatintelligence
Comments
Add Comment
1 min read
Better Together: Combining Automation and Manual Testing
Mark0
Mark0
Mark0
Follow
Mar 18
Better Together: Combining Automation and Manual Testing
#
cybersecurity
#
infosec
#
mobile
#
pentesting
Comments
Add Comment
1 min read
Update: oledump.py Version 0.0.85
Mark0
Mark0
Mark0
Follow
Mar 18
Update: oledump.py Version 0.0.85
#
cybersecurity
#
infosec
#
malware
#
python
Comments
Add Comment
1 min read
Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell
Mark0
Mark0
Mark0
Follow
Mar 18
Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell
#
cybersecurity
#
infosec
#
ai
#
nvidia
Comments
Add Comment
1 min read
UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection
Mark0
Mark0
Mark0
Follow
Mar 18
UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection
#
cybersecurity
#
infosec
#
appsec
#
vulnerability
1
reaction
Comments
Add Comment
1 min read
Free real estate: GoPix, the banking Trojan living off your memory
Mark0
Mark0
Mark0
Follow
Mar 18
Free real estate: GoPix, the banking Trojan living off your memory
#
cybersecurity
#
infosec
#
malware
#
gopix
Comments
Add Comment
1 min read
Boggy Serpens Threat Assessment
Mark0
Mark0
Mark0
Follow
Mar 18
Boggy Serpens Threat Assessment
#
cybersecurity
#
infosec
#
malware
#
espionage
Comments
Add Comment
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models
Mark0
Mark0
Mark0
Follow
Mar 18
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models
#
cybersecurity
#
infosec
#
ai
#
fuzzing
Comments
Add Comment
1 min read
Get started with Elastic Security from your AI agent
Mark0
Mark0
Mark0
Follow
Mar 18
Get started with Elastic Security from your AI agent
#
cybersecurity
#
infosec
#
ai
#
automation
Comments
Add Comment
1 min read
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
Mark0
Mark0
Mark0
Follow
Mar 18
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
#
cybersecurity
#
infosec
#
cloudsecurity
#
vulnerability
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account