DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Comments
1 min read
Intelligence Insights: March 2026

Intelligence Insights: March 2026

Comments
1 min read
Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown

Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown

Comments
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Comments
1 min read
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook

Everyday tools, extraordinary crimes: the ransomware exfiltration playbook

Comments
1 min read
You have to invite them in

You have to invite them in

1
Comments
1 min read
EDR killers explained: Beyond the drivers

EDR killers explained: Beyond the drivers

Comments
1 min read
Analyzing the Current State of AI Use in Malware

Analyzing the Current State of AI Use in Malware

Comments
1 min read
Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Comments
1 min read
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Comments
1 min read
Oracle pushes emergency fix for critical Identity Manager RCE flaw

Oracle pushes emergency fix for critical Identity Manager RCE flaw

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good, the Bad and the Ugly in Cybersecurity – Week 12

Comments
1 min read
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Comments
1 min read
How to Lead Effective Tabletops

How to Lead Effective Tabletops

Comments
1 min read
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

Comments
1 min read
2026-03-17: Seven days of scans and probes and web traffic hitting my web server

2026-03-17: Seven days of scans and probes and web traffic hitting my web server

Comments
1 min read
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Comments
1 min read
AI and browser threats stand out in the 2026 Threat Detection Report

AI and browser threats stand out in the 2026 Threat Detection Report

Comments
1 min read
Intelligence Insights: March 2026

Intelligence Insights: March 2026

Comments
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Comments
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Comments
1 min read
Analyzing the Current State of AI Use in Malware

Analyzing the Current State of AI Use in Malware

Comments
1 min read
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

Comments
1 min read
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Comments
1 min read
Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Comments
1 min read
ConnectWise patches new flaw allowing ScreenConnect hijacking

ConnectWise patches new flaw allowing ScreenConnect hijacking

Comments
1 min read
Why East-West Visibility Matters for Grid Security

Why East-West Visibility Matters for Grid Security

Comments
1 min read
Transparent COM instrumentation for malware analysis

Transparent COM instrumentation for malware analysis

Comments
1 min read
C2 Implant 'SnappyClient' Targets Crypto Wallets

C2 Implant 'SnappyClient' Targets Crypto Wallets

Comments
1 min read
Ransomware gang exploits Cisco flaw in zero-day attacks since January

Ransomware gang exploits Cisco flaw in zero-day attacks since January

1
Comments
1 min read
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

1
Comments
1 min read
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

Comments
1 min read
How to Lead Effective Tabletops

How to Lead Effective Tabletops

Comments
1 min read
Better Together: Combining Automation and Manual Testing

Better Together: Combining Automation and Manual Testing

1
Comments
1 min read
Update: oledump.py Version 0.0.85

Update: oledump.py Version 0.0.85

Comments
1 min read
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

1
Comments
1 min read
2026-03-17: Seven days of scans and probes and web traffic hitting my web server

2026-03-17: Seven days of scans and probes and web traffic hitting my web server

Comments
1 min read
AI and browser threats stand out in the 2026 Threat Detection Report

AI and browser threats stand out in the 2026 Threat Detection Report

Comments
1 min read
UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection

UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection

1
Comments
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Comments
1 min read
Get started with Elastic Security from your AI agent

Get started with Elastic Security from your AI agent

Comments
1 min read
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

Comments
1 min read
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Comments
1 min read
Why East-West Visibility Matters for Grid Security

Why East-West Visibility Matters for Grid Security

Comments
1 min read
Transparent COM instrumentation for malware analysis

Transparent COM instrumentation for malware analysis

Comments
1 min read
Ransomware gang exploits Cisco flaw in zero-day attacks since January

Ransomware gang exploits Cisco flaw in zero-day attacks since January

1
Comments
1 min read
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage

Comments
1 min read
LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks

LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks

Comments
1 min read
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

Comments
1 min read
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

Comments
1 min read
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape

Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape

Comments
1 min read
Better Together: Combining Automation and Manual Testing

Better Together: Combining Automation and Manual Testing

Comments
1 min read
Update: oledump.py Version 0.0.85

Update: oledump.py Version 0.0.85

Comments
1 min read
Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell

Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell

Comments
1 min read
UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection

UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection

1
Comments
1 min read
Free real estate: GoPix, the banking Trojan living off your memory

Free real estate: GoPix, the banking Trojan living off your memory

Comments
1 min read
Boggy Serpens Threat Assessment

Boggy Serpens Threat Assessment

Comments
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Comments
1 min read
Get started with Elastic Security from your AI agent

Get started with Elastic Security from your AI agent

Comments
1 min read
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

Comments
1 min read
loading...