DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
ShimBad the Sailor, Part 3

ShimBad the Sailor, Part 3

1
Comments
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

Comments
1 min read
From Access to Execution: Securing Identity in the Age of Autonomous Agents

From Access to Execution: Securing Identity in the Age of Autonomous Agents

Comments
1 min read
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

Comments
1 min read
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security

CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security

Comments
1 min read
New Dohdoor malware campaign targets education and health care

New Dohdoor malware campaign targets education and health care

1
Comments
1 min read
Make The Most of Network Firewall Logs with Elastic Security

Make The Most of Network Firewall Logs with Elastic Security

1
Comments
1 min read
Malware Analysis: How to Analyze and Understand Malware

Malware Analysis: How to Analyze and Understand Malware

Comments
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem

Building a Detection Foundation: Part 1 - The Single-Source Problem

Comments
1 min read
Zyxel warns of critical RCE flaw affecting over a dozen routers

Zyxel warns of critical RCE flaw affecting over a dozen routers

Comments
1 min read
Trend Micro warns of critical Apex One code execution flaws

Trend Micro warns of critical Apex One code execution flaws

Comments
1 min read
Henry IV, Hotspur, Hal, and hallucinations

Henry IV, Hotspur, Hal, and hallucinations

Comments
1 min read
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

1
Comments
1 min read
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Comments
1 min read
A Deep Dive into the GetProcessHandleFromHwnd API

A Deep Dive into the GetProcessHandleFromHwnd API

1
Comments
1 min read
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Comments
1 min read
ShimBad the Sailor, Part 3

ShimBad the Sailor, Part 3

Comments
1 min read
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

1
Comments
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

Comments
1 min read
From Access to Execution: Securing Identity in the Age of Autonomous Agents

From Access to Execution: Securing Identity in the Age of Autonomous Agents

Comments
1 min read
Faking it on the phone: How to tell if a voice call is AI or not

Faking it on the phone: How to tell if a voice call is AI or not

Comments
1 min read
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

Comments
1 min read
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Comments
1 min read
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

Comments
1 min read
Make The Most of Network Firewall Logs with Elastic Security

Make The Most of Network Firewall Logs with Elastic Security

Comments
1 min read
Malware Analysis: How to Analyze and Understand Malware

Malware Analysis: How to Analyze and Understand Malware

Comments
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem

Building a Detection Foundation: Part 1 - The Single-Source Problem

Comments
1 min read
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Comments
1 min read
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Comments
1 min read
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Comments
1 min read
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Comments
1 min read
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

Comments
1 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Comments 1
1 min read
Faking it on the phone: How to tell if a voice call is AI or not

Faking it on the phone: How to tell if a voice call is AI or not

Comments
1 min read
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Comments
1 min read
SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)

SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)

Comments
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem

Building a Detection Foundation: Part 1 - The Single-Source Problem

Comments
1 min read
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Comments
1 min read
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Comments
1 min read
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

Comments
1 min read
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Comments
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
2025: The Untold Stories of Check Point Research

2025: The Untold Stories of Check Point Research

Comments
1 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Comments
1 min read
Faking it on the phone: How to tell if a voice call is AI or not

Faking it on the phone: How to tell if a voice call is AI or not

Comments
1 min read
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Comments
1 min read
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

Comments
1 min read
SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)

SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)

Comments
1 min read
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

Comments
1 min read
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Comments
1 min read
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Comments
1 min read
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

Comments
1 min read
OSINT: How to Find, Use, and Control Open-Source Intelligence

OSINT: How to Find, Use, and Control Open-Source Intelligence

Comments
1 min read
macOS JIT Memory

macOS JIT Memory

Comments
1 min read
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

Comments
1 min read
The Immutable Illusion: Pwning Your Kernel with Cloud Files

The Immutable Illusion: Pwning Your Kernel with Cloud Files

Comments
1 min read
AI platforms can be abused for stealthy malware communication

AI platforms can be abused for stealthy malware communication

Comments
1 min read
Side-Channel Attacks Against LLMs

Side-Channel Attacks Against LLMs

Comments
1 min read
loading...