DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Updated GSA Contractor CUI Protection Requirements

Updated GSA Contractor CUI Protection Requirements

Comments
1 min read
Speeding APT Attack Confirmation with Attack Discovery, Workflows, and Agent Builder

Speeding APT Attack Confirmation with Attack Discovery, Workflows, and Agent Builder

Comments
1 min read
Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users

Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users

Comments
1 min read
OneClaw: Discovery and Observability for the Agentic Era

OneClaw: Discovery and Observability for the Agentic Era

Comments
1 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Comments
1 min read
Critical Vulnerabilities in Ivanti EPMM Exploited

Critical Vulnerabilities in Ivanti EPMM Exploited

Comments
1 min read
OSINT: How to Find, Use, and Control Open-Source Intelligence

OSINT: How to Find, Use, and Control Open-Source Intelligence

Comments
1 min read
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0

[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0

Comments
1 min read
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

Comments
1 min read
AI platforms can be abused for stealthy malware communication

AI platforms can be abused for stealthy malware communication

Comments
1 min read
Side-Channel Attacks Against LLMs

Side-Channel Attacks Against LLMs

Comments
1 min read
The Promptware Kill Chain

The Promptware Kill Chain

Comments
1 min read
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

Comments
1 min read
Updated GSA Contractor CUI Protection Requirements

Updated GSA Contractor CUI Protection Requirements

Comments
1 min read
Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users

Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users

Comments
1 min read
Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities

Spam Campaign Abuses Atlassian Jira, Targets Government and Corporate Entities

Comments
1 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Comments
1 min read
Critical Vulnerabilities in Ivanti EPMM Exploited

Critical Vulnerabilities in Ivanti EPMM Exploited

Comments
1 min read
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0

[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0

Comments
1 min read
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks

Comments
1 min read
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Comments
1 min read
Side-Channel Attacks Against LLMs

Side-Channel Attacks Against LLMs

Comments
1 min read
The Promptware Kill Chain

The Promptware Kill Chain

Comments
1 min read
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

Comments
1 min read
1 little known secret of CompatTelRunner.exe

1 little known secret of CompatTelRunner.exe

Comments
1 min read
WinHttpOpen user agents

WinHttpOpen user agents

Comments
1 min read
16th February – Threat Intelligence Report

16th February – Threat Intelligence Report

Comments
1 min read
Infostealer malware found stealing OpenClaw secrets for first time

Infostealer malware found stealing OpenClaw secrets for first time

Comments
1 min read
[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0

[Full Disclosure] CVE-2025-69690 & CVE-2025-69691 — Authenticated RCE in Netgate pfSense CE 2.7.2 and 2.8.0

Comments
1 min read
Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

Comments
1 min read
The Promptware Kill Chain

The Promptware Kill Chain

Comments
1 min read
Nation-State Hackers Put Defense Industrial Base Under Siege

Nation-State Hackers Put Defense Industrial Base Under Siege

Comments
1 min read
When the SOC Goes to Deadwood: A Night to Remember 

When the SOC Goes to Deadwood: A Night to Remember 

Comments
1 min read
MCP in Burp Suite: From Enumeration to Targeted Exploitation

MCP in Burp Suite: From Enumeration to Targeted Exploitation

Comments
1 min read
The Engineer's Guide to Elastic Detections as Code

The Engineer's Guide to Elastic Detections as Code

Comments
1 min read
CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test

CrowdStrike Falcon Scores Perfect 100% in SE Labs’ Most Challenging Ransomware Test

Comments
1 min read
What Security Teams Need to Know About OpenClaw, the AI Super Agent

What Security Teams Need to Know About OpenClaw, the AI Super Agent

Comments
1 min read
OfferUp scammers are out in force: Here’s what you should know

OfferUp scammers are out in force: Here’s what you should know

Comments
1 min read
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs

The Notepad++ supply chain attack — unnoticed execution chains and new IoCs

Comments
1 min read
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT

Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT

Comments
1 min read
[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE

Comments
1 min read
DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector

DYNOWIPER: Destructive Malware Targeting Poland's Energy Sector

Comments
1 min read
Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive

Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive

Comments
1 min read
EDR killer tool uses signed kernel driver from forensic software

EDR killer tool uses signed kernel driver from forensic software

Comments
1 min read
2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration

2026-02-03: GuLoader for AgentTesla style malware with FTP data exfiltration

Comments
1 min read
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

Comments
1 min read
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis

Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis

Comments
1 min read
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]

Comments
1 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
This month in security with Tony Anscombe – January 2026 edition

This month in security with Tony Anscombe – January 2026 edition

Comments
1 min read
How Agentic Tool Chain Attacks Threaten AI Agent Security

How Agentic Tool Chain Attacks Threaten AI Agent Security

Comments
1 min read
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

Comments
1 min read
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 5

The Good, the Bad and the Ugly in Cybersecurity – Week 5

Comments
1 min read
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

Comments
1 min read
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

Comments
1 min read
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Comments
1 min read
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS

Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS

Comments
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Comments
1 min read
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
loading...