Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Follow
User actions
Mark0
404 bio not found
Joined
Joined on
Jan 9, 2026
More info about @mark0_617b45cda9782a
Post
151 posts published
Comment
0 comments written
Tag
0 tags followed
Updated GSA Contractor CUI Protection Requirements
Mark0
Mark0
Mark0
Follow
Feb 19
Updated GSA Contractor CUI Protection Requirements
#
cybersecurity
#
infosec
#
compliance
#
nist
Comments
Add Comment
1 min read
Speeding APT Attack Confirmation with Attack Discovery, Workflows, and Agent Builder
Mark0
Mark0
Mark0
Follow
Feb 19
Speeding APT Attack Confirmation with Attack Discovery, Workflows, and Agent Builder
#
cybersecurity
#
infosec
#
automation
#
threathunting
Comments
Add Comment
1 min read
Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users
Mark0
Mark0
Mark0
Follow
Feb 19
Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users
#
cybersecurity
#
infosec
#
ai
#
threatdetection
Comments
Add Comment
1 min read
OneClaw: Discovery and Observability for the Agentic Era
Mark0
Mark0
Mark0
Follow
Feb 19
OneClaw: Discovery and Observability for the Agentic Era
#
cybersecurity
#
infosec
#
ai
#
security
Comments
Add Comment
1 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
Mark0
Mark0
Mark0
Follow
Feb 19
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
#
cybersecurity
#
infosec
#
android
#
backdoor
Comments
Add Comment
1 min read
Critical Vulnerabilities in Ivanti EPMM Exploited
Mark0
Mark0
Mark0
Follow
Feb 19
Critical Vulnerabilities in Ivanti EPMM Exploited
#
cybersecurity
#
infosec
#
vulnerability
#
rce
Comments
Add Comment
1 min read
OSINT: How to Find, Use, and Control Open-Source Intelligence
Mark0
Mark0
Mark0
Follow
Feb 19
OSINT: How to Find, Use, and Control Open-Source Intelligence
#
cybersecurity
#
infosec
#
osint
#
privacy
Comments
Add Comment
1 min read
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0
Mark0
Mark0
Mark0
Follow
Feb 19
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0
#
cybersecurity
#
infosec
#
pfsense
#
exploit
Comments
Add Comment
1 min read
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks
Mark0
Mark0
Mark0
Follow
Feb 19
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
AI platforms can be abused for stealthy malware communication
Mark0
Mark0
Mark0
Follow
Feb 19
AI platforms can be abused for stealthy malware communication
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
Side-Channel Attacks Against LLMs
Mark0
Mark0
Mark0
Follow
Feb 19
Side-Channel Attacks Against LLMs
#
cybersecurity
#
infosec
#
ai
#
sidechannel
Comments
Add Comment
1 min read
The Promptware Kill Chain
Mark0
Mark0
Mark0
Follow
Feb 19
The Promptware Kill Chain
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
Mark0
Mark0
Mark0
Follow
Feb 19
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
#
cybersecurity
#
infosec
#
malware
#
vulnerability
Comments
Add Comment
1 min read
Updated GSA Contractor CUI Protection Requirements
Mark0
Mark0
Mark0
Follow
Feb 18
Updated GSA Contractor CUI Protection Requirements
#
cybersecurity
#
infosec
#
compliance
#
nist
Comments
Add Comment
1 min read
Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users
Mark0
Mark0
Mark0
Follow
Feb 18
Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users
#
cybersecurity
#
infosec
#
ai
#
threathunting
Comments
Add Comment
1 min read
Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities
Mark0
Mark0
Mark0
Follow
Feb 18
Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities
#
cybersecurity
#
infosec
#
cloudsecurity
#
phishing
Comments
Add Comment
1 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
Mark0
Mark0
Mark0
Follow
Feb 18
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
#
cybersecurity
#
infosec
#
android
#
malware
Comments
Add Comment
1 min read
Critical Vulnerabilities in Ivanti EPMM Exploited
Mark0
Mark0
Mark0
Follow
Feb 18
Critical Vulnerabilities in Ivanti EPMM Exploited
#
cybersecurity
#
infosec
#
vulnerability
#
security
Comments
Add Comment
1 min read
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0
Mark0
Mark0
Mark0
Follow
Feb 18
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0
#
cybersecurity
#
infosec
#
pfsense
#
networksecurity
Comments
Add Comment
1 min read
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks
Mark0
Mark0
Mark0
Follow
Feb 18
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Mark0
Mark0
Mark0
Follow
Feb 18
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
Side-Channel Attacks Against LLMs
Mark0
Mark0
Mark0
Follow
Feb 18
Side-Channel Attacks Against LLMs
#
cybersecurity
#
infosec
#
llm
#
sidechannel
Comments
Add Comment
1 min read
The Promptware Kill Chain
Mark0
Mark0
Mark0
Follow
Feb 18
The Promptware Kill Chain
#
cybersecurity
#
infosec
#
ai
#
promptware
Comments
Add Comment
1 min read
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
Mark0
Mark0
Mark0
Follow
Feb 18
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
#
cybersecurity
#
infosec
#
malware
#
vulnerability
Comments
Add Comment
1 min read
1 little known secret of CompatTelRunner.exe
Mark0
Mark0
Mark0
Follow
Feb 17
1 little known secret of CompatTelRunner.exe
#
cybersecurity
#
infosec
#
windows
#
reverseengineering
Comments
Add Comment
1 min read
WinHttpOpen user agents
Mark0
Mark0
Mark0
Follow
Feb 17
WinHttpOpen user agents
#
cybersecurity
#
infosec
#
windows
#
networking
Comments
Add Comment
1 min read
16th February – Threat Intelligence Report
Mark0
Mark0
Mark0
Follow
Feb 17
16th February – Threat Intelligence Report
#
cybersecurity
#
infosec
#
threatintelligence
#
malware
Comments
Add Comment
1 min read
Infostealer malware found stealing OpenClaw secrets for first time
Mark0
Mark0
Mark0
Follow
Feb 17
Infostealer malware found stealing OpenClaw secrets for first time
#
cybersecurity
#
infosec
#
malware
#
ai
Comments
Add Comment
1 min read
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0
Mark0
Mark0
Mark0
Follow
Feb 17
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0
#
cybersecurity
#
infosec
#
vulnerability
#
pfsense
Comments
Add Comment
1 min read
Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware
Mark0
Mark0
Mark0
Follow
Feb 17
Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware
#
cybersecurity
#
infosec
#
vulnerability
#
cloudsecurity
Comments
Add Comment
1 min read
The Promptware Kill Chain
Mark0
Mark0
Mark0
Follow
Feb 17
The Promptware Kill Chain
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
Nation-State Hackers Put Defense Industrial Base Under Siege
Mark0
Mark0
Mark0
Follow
Feb 16
Nation-State Hackers Put Defense Industrial Base Under Siege
#
cybersecurity
#
infosec
#
threatintelligence
#
zeroday
Comments
Add Comment
1 min read
When the SOC Goes to Deadwood: A Night to Remember
Mark0
Mark0
Mark0
Follow
Feb 6
When the SOC Goes to Deadwood: A Night to Remember
#
cybersecurity
#
infosec
#
incidentresponse
#
ransomware
Comments
Add Comment
1 min read
MCP in Burp Suite: From Enumeration to Targeted Exploitation
Mark0
Mark0
Mark0
Follow
Feb 6
MCP in Burp Suite: From Enumeration to Targeted Exploitation
#
cybersecurity
#
infosec
#
ai
#
pentesting
Comments
Add Comment
1 min read
The Engineer's Guide to Elastic Detections as Code
Mark0
Mark0
Mark0
Follow
Feb 6
The Engineer's Guide to Elastic Detections as Code
#
cybersecurity
#
infosec
#
automation
#
devsecops
Comments
Add Comment
1 min read
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test
Mark0
Mark0
Mark0
Follow
Feb 6
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test
#
cybersecurity
#
infosec
#
ransomware
#
edr
Comments
Add Comment
1 min read
What Security Teams Need to Know About OpenClaw, the AI Super Agent
Mark0
Mark0
Mark0
Follow
Feb 6
What Security Teams Need to Know About OpenClaw, the AI Super Agent
#
cybersecurity
#
infosec
#
ai
#
threatintelligence
Comments
Add Comment
1 min read
OfferUp scammers are out in force: Here’s what you should know
Mark0
Mark0
Mark0
Follow
Feb 6
OfferUp scammers are out in force: Here’s what you should know
#
cybersecurity
#
infosec
#
phishing
#
fraud
Comments
Add Comment
1 min read
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Mark0
Mark0
Mark0
Follow
Feb 6
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
#
cybersecurity
#
infosec
#
malware
#
supplychain
Comments
Add Comment
1 min read
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
Mark0
Mark0
Mark0
Follow
Feb 6
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
#
cybersecurity
#
infosec
#
malware
#
stanghouls
Comments
Add Comment
1 min read
[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
Mark0
Mark0
Mark0
Follow
Feb 6
[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE
#
cybersecurity
#
infosec
#
kubernetes
#
exploit
Comments
Add Comment
1 min read
DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector
Mark0
Mark0
Mark0
Follow
Feb 6
DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector
#
cybersecurity
#
infosec
#
malware
#
wiper
Comments
Add Comment
1 min read
Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive
Mark0
Mark0
Mark0
Follow
Feb 6
Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive
#
cybersecurity
#
infosec
#
jwt
#
webdev
Comments
Add Comment
1 min read
EDR killer tool uses signed kernel driver from forensic software
Mark0
Mark0
Mark0
Follow
Feb 6
EDR killer tool uses signed kernel driver from forensic software
#
cybersecurity
#
infosec
#
malware
#
byovd
Comments
Add Comment
1 min read
2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration
Mark0
Mark0
Mark0
Follow
Feb 6
2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration
#
cybersecurity
#
infosec
#
analysis
#
technical
Comments
Add Comment
1 min read
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
Mark0
Mark0
Mark0
Follow
Feb 6
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
#
cybersecurity
#
infosec
#
malware
#
asyncrat
Comments
Add Comment
1 min read
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
Mark0
Mark0
Mark0
Follow
Feb 6
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
#
cybersecurity
#
infosec
#
threatintel
#
iran
Comments
Add Comment
1 min read
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]
Mark0
Mark0
Mark0
Follow
Feb 3
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]
#
cybersecurity
#
infosec
#
malware
#
notepad
Comments
Add Comment
1 min read
DynoWiper update: Technical analysis and attribution
Mark0
Mark0
Mark0
Follow
Feb 2
DynoWiper update: Technical analysis and attribution
#
cybersecurity
#
infosec
#
malware
#
sandworm
Comments
Add Comment
1 min read
This month in security with Tony Anscombe – January 2026 edition
Mark0
Mark0
Mark0
Follow
Feb 2
This month in security with Tony Anscombe – January 2026 edition
#
cybersecurity
#
infosec
#
vulnerability
#
ai
Comments
Add Comment
1 min read
How Agentic Tool Chain Attacks Threaten AI Agent Security
Mark0
Mark0
Mark0
Follow
Feb 2
How Agentic Tool Chain Attacks Threaten AI Agent Security
#
cybersecurity
#
infosec
#
ai
#
security
Comments
Add Comment
1 min read
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
Mark0
Mark0
Mark0
Follow
Feb 2
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
#
cybersecurity
#
infosec
#
smartermail
#
vulnerability
Comments
Add Comment
1 min read
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Mark0
Mark0
Mark0
Follow
Feb 2
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
#
cybersecurity
#
infosec
#
malware
#
server
Comments
Add Comment
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 5
Mark0
Mark0
Mark0
Follow
Feb 2
The Good, the Bad and the Ugly in Cybersecurity – Week 5
#
news
#
cybersecurity
#
infosec
#
vulnerability
Comments
Add Comment
1 min read
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
Mark0
Mark0
Mark0
Follow
Feb 2
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
#
cybersecurity
#
infosec
#
ai
#
vulnerability
Comments
Add Comment
1 min read
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529
Mark0
Mark0
Mark0
Follow
Feb 2
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529
Comments
Add Comment
1 min read
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
Mark0
Mark0
Mark0
Follow
Feb 2
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
#
cybersecurity
#
infosec
#
cloud
#
vishing
Comments
Add Comment
1 min read
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
Mark0
Mark0
Mark0
Follow
Feb 2
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
#
cybersecurity
#
infosec
#
mandiant
#
cloudsecurity
Comments
Add Comment
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions
Mark0
Mark0
Mark0
Follow
Jan 30
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions
#
cybersecurity
#
infosec
#
socialengineering
#
microsoft365
Comments
Add Comment
1 min read
LDAP Channel Binding and LDAP Signing
Mark0
Mark0
Mark0
Follow
Jan 30
LDAP Channel Binding and LDAP Signing
#
cybersecurity
#
infosec
#
activedirectory
#
ldap
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account