DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Overview of Content Published in February

Overview of Content Published in February

Comments
1 min read
2026-02-28: Traffic Analysis Exercise - Easy as 123

2026-02-28: Traffic Analysis Exercise - Easy as 123

Comments
1 min read
Red Canary CFP tracker: March 2026

Red Canary CFP tracker: March 2026

Comments
1 min read
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

Comments
1 min read
2nd March – Threat Intelligence Report

2nd March – Threat Intelligence Report

Comments
1 min read
This month in security with Tony Anscombe – February 2026 edition

This month in security with Tony Anscombe – February 2026 edition

Comments
1 min read
CrowdStrike Achieves NCSC CIR Assurance for Incident Response

CrowdStrike Achieves NCSC CIR Assurance for Incident Response

Comments
1 min read
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

Comments
1 min read
⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

Comments
1 min read
ClawJacked attack let malicious websites hijack OpenClaw to steal data

ClawJacked attack let malicious websites hijack OpenClaw to steal data

Comments
1 min read
Talos on the developing situation in the Middle East

Talos on the developing situation in the Middle East

Comments
1 min read
UK warns of Iranian cyberattack risks amid Middle-East conflict

UK warns of Iranian cyberattack risks amid Middle-East conflict

Comments
1 min read
ShimBad the Sailor, Part 3

ShimBad the Sailor, Part 3

1
Comments
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

Comments
1 min read
From Access to Execution: Securing Identity in the Age of Autonomous Agents

From Access to Execution: Securing Identity in the Age of Autonomous Agents

Comments
1 min read
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

Comments
1 min read
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security

CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security

Comments
1 min read
New Dohdoor malware campaign targets education and health care

New Dohdoor malware campaign targets education and health care

1
Comments
1 min read
Make The Most of Network Firewall Logs with Elastic Security

Make The Most of Network Firewall Logs with Elastic Security

1
Comments
1 min read
Malware Analysis: How to Analyze and Understand Malware

Malware Analysis: How to Analyze and Understand Malware

Comments
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem

Building a Detection Foundation: Part 1 - The Single-Source Problem

1
Comments
1 min read
Zyxel warns of critical RCE flaw affecting over a dozen routers

Zyxel warns of critical RCE flaw affecting over a dozen routers

Comments
1 min read
Trend Micro warns of critical Apex One code execution flaws

Trend Micro warns of critical Apex One code execution flaws

Comments
1 min read
Henry IV, Hotspur, Hal, and hallucinations

Henry IV, Hotspur, Hal, and hallucinations

Comments
1 min read
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

1
Comments
1 min read
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Comments
1 min read
A Deep Dive into the GetProcessHandleFromHwnd API

A Deep Dive into the GetProcessHandleFromHwnd API

1
Comments
1 min read
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

1
Comments
1 min read
ShimBad the Sailor, Part 3

ShimBad the Sailor, Part 3

Comments
1 min read
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

1
Comments
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity

Comments
1 min read
From Access to Execution: Securing Identity in the Age of Autonomous Agents

From Access to Execution: Securing Identity in the Age of Autonomous Agents

Comments
1 min read
Faking it on the phone: How to tell if a voice call is AI or not

Faking it on the phone: How to tell if a voice call is AI or not

Comments
1 min read
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

Comments
1 min read
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Comments
1 min read
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

Comments
1 min read
Make The Most of Network Firewall Logs with Elastic Security

Make The Most of Network Firewall Logs with Elastic Security

Comments
1 min read
Malware Analysis: How to Analyze and Understand Malware

Malware Analysis: How to Analyze and Understand Malware

Comments
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem

Building a Detection Foundation: Part 1 - The Single-Source Problem

Comments
1 min read
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852

Comments
1 min read
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign

Comments
1 min read
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Comments
1 min read
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Comments
1 min read
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

Comments
1 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Comments 1
1 min read
Faking it on the phone: How to tell if a voice call is AI or not

Faking it on the phone: How to tell if a voice call is AI or not

Comments
1 min read
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Comments
1 min read
SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)

SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)

Comments
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem

Building a Detection Foundation: Part 1 - The Single-Source Problem

Comments
1 min read
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Comments
1 min read
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Comments
1 min read
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

Comments
1 min read
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION

Comments
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
2025: The Untold Stories of Check Point Research

2025: The Untold Stories of Check Point Research

Comments
1 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

Comments
1 min read
Faking it on the phone: How to tell if a voice call is AI or not

Faking it on the phone: How to tell if a voice call is AI or not

Comments
1 min read
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security

Comments
1 min read
loading...