DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Colonel Clustered: Finding Outliers in Burp Intruder

Colonel Clustered: Finding Outliers in Burp Intruder

Comments
1 min read
2026-01-19: Six days of scans and probes and web traffic hitting my web server

2026-01-19: Six days of scans and probes and web traffic hitting my web server

Comments
1 min read
Clear skies ahead with Wiz visibility and Red Canary MDR

Clear skies ahead with Wiz visibility and Red Canary MDR

Comments
1 min read
From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers

From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers

Comments
1 min read
DNS OverDoS: Are Private Endpoints Too Private?

DNS OverDoS: Are Private Endpoints Too Private?

Comments
1 min read
2026-01-14: Lumma Stealer infection with follow-up malware

2026-01-14: Lumma Stealer infection with follow-up malware

Comments
1 min read
2026-01-15: XLoader (Formbook) infection

2026-01-15: XLoader (Formbook) infection

Comments
1 min read
Gemini AI assistant tricked into leaking Google Calendar data

Gemini AI assistant tricked into leaking Google Calendar data

Comments
1 min read
Could ChatGPT Convince You to Buy Something?

Could ChatGPT Convince You to Buy Something?

Comments
1 min read
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Comments
1 min read
Update: zipdump.py Version 0.0.33

Update: zipdump.py Version 0.0.33

Comments
1 min read
2026-01-19: Six days of scans and probes and web traffic hitting my web server

2026-01-19: Six days of scans and probes and web traffic hitting my web server

Comments
1 min read
19th January – Threat Intelligence Report

19th January – Threat Intelligence Report

Comments
1 min read
From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers

From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers

Comments
1 min read
Jordanian pleads guilty to selling access to 50 corporate networks

Jordanian pleads guilty to selling access to 50 corporate networks

Comments
1 min read
2026-01-14: Lumma Stealer infection with follow-up malware

2026-01-14: Lumma Stealer infection with follow-up malware

Comments
1 min read
2026-01-15: XLoader (Formbook) infection

2026-01-15: XLoader (Formbook) infection

Comments
1 min read
Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

Comments
1 min read
New PDFSider Windows malware deployed on Fortune 100 firm's network

New PDFSider Windows malware deployed on Fortune 100 firm's network

Comments
1 min read
Ukraine's army targeted in new charity-themed malware campaign

Ukraine's army targeted in new charity-themed malware campaign

Comments
1 min read
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces

PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces

Comments
1 min read
Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Comments
1 min read
loading...