Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
Follow
User actions
Mark0
404 bio not found
Joined
Joined on
Jan 9, 2026
More info about @mark0_617b45cda9782a
Post
225 posts published
Comment
0 comments written
Tag
0 tags followed
Overview of Content Published in February
Mark0
Mark0
Mark0
Follow
Mar 3
Overview of Content Published in February
#
cybersecurity
#
infosec
#
malware
#
tutorial
Comments
Add Comment
1 min read
2026-02-28: Traffic Analysis Exercise - Easy as 123
Mark0
Mark0
Mark0
Follow
Mar 3
2026-02-28: Traffic Analysis Exercise - Easy as 123
#
cybersecurity
#
infosec
#
networksecurity
#
forensics
Comments
Add Comment
1 min read
Red Canary CFP tracker: March 2026
Mark0
Mark0
Mark0
Follow
Mar 3
Red Canary CFP tracker: March 2026
#
cybersecurity
#
infosec
#
conference
#
career
Comments
Add Comment
1 min read
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook
Mark0
Mark0
Mark0
Follow
Mar 3
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook
#
cybersecurity
#
infosec
#
threatintelligence
#
malware
Comments
Add Comment
1 min read
2nd March – Threat Intelligence Report
Mark0
Mark0
Mark0
Follow
Mar 3
2nd March – Threat Intelligence Report
#
cybersecurity
#
infosec
#
vulnerability
#
threatintelligence
Comments
Add Comment
1 min read
This month in security with Tony Anscombe – February 2026 edition
Mark0
Mark0
Mark0
Follow
Mar 3
This month in security with Tony Anscombe – February 2026 edition
#
cybersecurity
#
infosec
#
ai
#
malware
Comments
Add Comment
1 min read
CrowdStrike Achieves NCSC CIR Assurance for Incident Response
Mark0
Mark0
Mark0
Follow
Mar 3
CrowdStrike Achieves NCSC CIR Assurance for Incident Response
#
cybersecurity
#
infosec
#
incidentresponse
#
threatintelligence
Comments
Add Comment
1 min read
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
Mark0
Mark0
Mark0
Follow
Mar 3
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
#
cybersecurity
#
infosec
#
chrome
#
vulnerability
Comments
Add Comment
1 min read
⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
Mark0
Mark0
Mark0
Follow
Mar 3
⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
#
cybersecurity
#
infosec
#
networking
#
ai
Comments
Add Comment
1 min read
ClawJacked attack let malicious websites hijack OpenClaw to steal data
Mark0
Mark0
Mark0
Follow
Mar 3
ClawJacked attack let malicious websites hijack OpenClaw to steal data
#
cybersecurity
#
infosec
#
vulnerability
#
openclaw
Comments
Add Comment
1 min read
Talos on the developing situation in the Middle East
Mark0
Mark0
Mark0
Follow
Mar 3
Talos on the developing situation in the Middle East
#
cybersecurity
#
infosec
#
threatintelligence
#
middleeast
Comments
Add Comment
1 min read
UK warns of Iranian cyberattack risks amid Middle-East conflict
Mark0
Mark0
Mark0
Follow
Mar 3
UK warns of Iranian cyberattack risks amid Middle-East conflict
#
cybersecurity
#
infosec
#
threatintelligence
#
ncsc
Comments
Add Comment
1 min read
ShimBad the Sailor, Part 3
Mark0
Mark0
Mark0
Follow
Feb 27
ShimBad the Sailor, Part 3
#
cybersecurity
#
infosec
#
windows
#
reverseengineering
1
reaction
Comments
Add Comment
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
Mark0
Mark0
Mark0
Follow
Feb 27
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
#
cybersecurity
#
infosec
#
azure
#
oauth
1
reaction
Comments
Add Comment
1 min read
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity
Mark0
Mark0
Mark0
Follow
Feb 27
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity
#
cybersecurity
#
infosec
#
identity
#
infostealer
Comments
Add Comment
1 min read
From Access to Execution: Securing Identity in the Age of Autonomous Agents
Mark0
Mark0
Mark0
Follow
Feb 27
From Access to Execution: Securing Identity in the Age of Autonomous Agents
#
cybersecurity
#
infosec
#
identity
#
ai
Comments
Add Comment
1 min read
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI
Mark0
Mark0
Mark0
Follow
Feb 27
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI
#
cybersecurity
#
infosec
#
cloudsecurity
#
threatintelligence
Comments
Add Comment
1 min read
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
Mark0
Mark0
Mark0
Follow
Feb 27
CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security
#
cybersecurity
#
infosec
#
mfa
#
identitysecurity
Comments
Add Comment
1 min read
New Dohdoor malware campaign targets education and health care
Mark0
Mark0
Mark0
Follow
Feb 27
New Dohdoor malware campaign targets education and health care
#
cybersecurity
#
infosec
#
malware
#
dnsoverhttps
1
reaction
Comments
Add Comment
1 min read
Make The Most of Network Firewall Logs with Elastic Security
Mark0
Mark0
Mark0
Follow
Feb 27
Make The Most of Network Firewall Logs with Elastic Security
#
cybersecurity
#
infosec
#
monitoring
#
network
1
reaction
Comments
Add Comment
1 min read
Malware Analysis: How to Analyze and Understand Malware
Mark0
Mark0
Mark0
Follow
Feb 27
Malware Analysis: How to Analyze and Understand Malware
#
cybersecurity
#
infosec
#
malware
#
tutorial
Comments
Add Comment
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem
Mark0
Mark0
Mark0
Follow
Feb 27
Building a Detection Foundation: Part 1 - The Single-Source Problem
#
cybersecurity
#
infosec
#
windows
#
logging
1
reaction
Comments
Add Comment
1 min read
Zyxel warns of critical RCE flaw affecting over a dozen routers
Mark0
Mark0
Mark0
Follow
Feb 27
Zyxel warns of critical RCE flaw affecting over a dozen routers
#
cybersecurity
#
infosec
#
networksecurity
#
vulnerability
Comments
Add Comment
1 min read
Trend Micro warns of critical Apex One code execution flaws
Mark0
Mark0
Mark0
Follow
Feb 27
Trend Micro warns of critical Apex One code execution flaws
#
cybersecurity
#
infosec
#
vulnerability
#
patch
Comments
Add Comment
1 min read
Henry IV, Hotspur, Hal, and hallucinations
Mark0
Mark0
Mark0
Follow
Feb 27
Henry IV, Hotspur, Hal, and hallucinations
#
cybersecurity
#
infosec
#
malware
#
threatintel
Comments
Add Comment
1 min read
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023
Mark0
Mark0
Mark0
Follow
Feb 27
Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023
#
cybersecurity
#
infosec
#
networking
#
vulnerability
1
reaction
Comments
Add Comment
1 min read
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852
Mark0
Mark0
Mark0
Follow
Feb 27
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852
#
cybersecurity
#
infosec
#
ai
#
vulnerability
Comments
Add Comment
1 min read
A Deep Dive into the GetProcessHandleFromHwnd API
Mark0
Mark0
Mark0
Follow
Feb 27
A Deep Dive into the GetProcessHandleFromHwnd API
#
cybersecurity
#
infosec
#
windows
#
exploit
1
reaction
Comments
Add Comment
1 min read
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
Mark0
Mark0
Mark0
Follow
Feb 27
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
#
cybersecurity
#
infosec
#
threatintelligence
#
malware
1
reaction
Comments
Add Comment
1 min read
ShimBad the Sailor, Part 3
Mark0
Mark0
Mark0
Follow
Feb 26
ShimBad the Sailor, Part 3
#
cybersecurity
#
infosec
#
windows
#
shim
Comments
Add Comment
1 min read
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION
Mark0
Mark0
Mark0
Follow
Feb 26
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION
#
cybersecurity
#
infosec
#
elasticsearch
#
ai
1
reaction
Comments
Add Comment
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
Mark0
Mark0
Mark0
Follow
Feb 26
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
#
cybersecurity
#
infosec
#
azure
#
oauth
1
reaction
Comments
Add Comment
1 min read
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity
Mark0
Mark0
Mark0
Follow
Feb 26
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity
#
cybersecurity
#
infosec
#
identity
#
authentication
Comments
Add Comment
1 min read
From Access to Execution: Securing Identity in the Age of Autonomous Agents
Mark0
Mark0
Mark0
Follow
Feb 26
From Access to Execution: Securing Identity in the Age of Autonomous Agents
#
cybersecurity
#
infosec
#
identity
#
ai
Comments
Add Comment
1 min read
Faking it on the phone: How to tell if a voice call is AI or not
Mark0
Mark0
Mark0
Follow
Feb 26
Faking it on the phone: How to tell if a voice call is AI or not
#
cybersecurity
#
infosec
#
ai
#
fraud
Comments
Add Comment
1 min read
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI
Mark0
Mark0
Mark0
Follow
Feb 26
CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI
#
cybersecurity
#
infosec
#
threatintelligence
#
cloudsecurity
Comments
Add Comment
1 min read
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616
Mark0
Mark0
Mark0
Follow
Feb 26
Active exploitation of Cisco Catalyst SD-WAN by UAT-8616
#
cybersecurity
#
infosec
#
networking
#
vulnerability
Comments
Add Comment
1 min read
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection
Mark0
Mark0
Mark0
Follow
Feb 26
The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection
#
cybersecurity
#
infosec
#
phishing
#
security
Comments
Add Comment
1 min read
Make The Most of Network Firewall Logs with Elastic Security
Mark0
Mark0
Mark0
Follow
Feb 26
Make The Most of Network Firewall Logs with Elastic Security
#
cybersecurity
#
infosec
#
networking
#
elastic
Comments
Add Comment
1 min read
Malware Analysis: How to Analyze and Understand Malware
Mark0
Mark0
Mark0
Follow
Feb 26
Malware Analysis: How to Analyze and Understand Malware
#
cybersecurity
#
infosec
#
malware
#
tutorial
Comments
Add Comment
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem
Mark0
Mark0
Mark0
Follow
Feb 26
Building a Detection Foundation: Part 1 - The Single-Source Problem
#
cybersecurity
#
infosec
#
windows
#
blueteam
Comments
Add Comment
1 min read
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852
Mark0
Mark0
Mark0
Follow
Feb 26
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852
#
cybersecurity
#
infosec
#
ai
#
rce
Comments
Add Comment
1 min read
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
Mark0
Mark0
Mark0
Follow
Feb 26
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
#
cybersecurity
#
infosec
#
malware
#
cloudsecurity
Comments
Add Comment
1 min read
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Mark0
Mark0
Mark0
Follow
Feb 26
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
#
cybersecurity
#
infosec
#
ransomware
#
lazarus
Comments
Add Comment
1 min read
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount
Mark0
Mark0
Mark0
Follow
Feb 26
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount
#
cybersecurity
#
infosec
#
malware
#
muddywater
Comments
Add Comment
1 min read
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
Mark0
Mark0
Mark0
Follow
Feb 26
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
#
cybersecurity
#
infosec
#
malware
#
rust
Comments
Add Comment
1 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
Mark0
Mark0
Mark0
Follow
Feb 25
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
#
cybersecurity
#
infosec
#
macos
#
ai
Comments
1
comment
1 min read
Faking it on the phone: How to tell if a voice call is AI or not
Mark0
Mark0
Mark0
Follow
Feb 25
Faking it on the phone: How to tell if a voice call is AI or not
#
cybersecurity
#
infosec
#
ai
#
deepfake
Comments
Add Comment
1 min read
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security
Mark0
Mark0
Mark0
Follow
Feb 25
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security
#
cybersecurity
#
infosec
#
otsecurity
#
threatintelligence
Comments
Add Comment
1 min read
SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)
Mark0
Mark0
Mark0
Follow
Feb 25
SEC Consult SA-20260218-0 :: Multiple Critical Vulnerabilities in NesterSoft WorkTime (on-prem/cloud)
#
cybersecurity
#
infosec
#
vulnerability
#
rce
Comments
Add Comment
1 min read
Building a Detection Foundation: Part 1 - The Single-Source Problem
Mark0
Mark0
Mark0
Follow
Feb 25
Building a Detection Foundation: Part 1 - The Single-Source Problem
#
cybersecurity
#
infosec
#
detection
#
sysmon
Comments
Add Comment
1 min read
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Mark0
Mark0
Mark0
Follow
Feb 25
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
#
cybersecurity
#
infosec
#
ransomware
#
threatintelligence
Comments
Add Comment
1 min read
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount
Mark0
Mark0
Mark0
Follow
Feb 25
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount
#
cybersecurity
#
infosec
#
malware
#
threatintelligence
Comments
Add Comment
1 min read
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
Mark0
Mark0
Mark0
Follow
Feb 25
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
#
cybersecurity
#
infosec
#
malware
#
threatintel
Comments
Add Comment
1 min read
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION
Mark0
Mark0
Mark0
Follow
Feb 24
Beyond Behaviors: AI-Augmented Detection Engineering with ES|QL COMPLETION
#
cybersecurity
#
infosec
#
elastic
#
ai
Comments
Add Comment
1 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
Mark0
Mark0
Mark0
Follow
Feb 24
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions
#
cybersecurity
#
infosec
#
azure
#
oauth
1
reaction
Comments
Add Comment
1 min read
2025: The Untold Stories of Check Point Research
Mark0
Mark0
Mark0
Follow
Feb 24
2025: The Untold Stories of Check Point Research
#
cybersecurity
#
infosec
#
threatintelligence
#
malware
Comments
Add Comment
1 min read
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
Mark0
Mark0
Mark0
Follow
Feb 24
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
#
cybersecurity
#
infosec
#
malware
#
macos
Comments
Add Comment
1 min read
Faking it on the phone: How to tell if a voice call is AI or not
Mark0
Mark0
Mark0
Follow
Feb 24
Faking it on the phone: How to tell if a voice call is AI or not
#
cybersecurity
#
infosec
#
ai
#
deepfake
Comments
Add Comment
1 min read
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security
Mark0
Mark0
Mark0
Follow
Feb 24
Bring the Fight to the Edge: Turning Time Into an Advantage in OT Security
#
cybersecurity
#
infosec
#
otsecurity
#
threatintelligence
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account