DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Comments
1 min read
13th April – Threat Intelligence Report

13th April – Threat Intelligence Report

Comments
1 min read
JanelaRAT: a financial threat targeting users in Latin America

JanelaRAT: a financial threat targeting users in Latin America

Comments
1 min read
On Anthropic’s Mythos Preview and Project Glasswing

On Anthropic’s Mythos Preview and Project Glasswing

Comments
1 min read
Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Comments
1 min read
Siemens Healthineers with Special Guest Javier Azofra Ovejero

Siemens Healthineers with Special Guest Javier Azofra Ovejero

Comments
1 min read
[Video] The TTP Ep. 22: The Collapse of the Patch Window

[Video] The TTP Ep. 22: The Collapse of the Patch Window

Comments
1 min read
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Comments
1 min read
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Comments
1 min read
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Comments
1 min read
Critical Marimo pre-auth RCE flaw now under active exploitation

Critical Marimo pre-auth RCE flaw now under active exploitation

Comments
1 min read
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Comments
1 min read
[local] NetBT e-Fatura - Privilege Escalation

[local] NetBT e-Fatura - Privilege Escalation

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Comments
1 min read
Crystal Mask

Crystal Mask

Comments
1 min read
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Comments
1 min read
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Comments
1 min read
Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

Comments
1 min read
Getting Started In Pentesting – Advice From The BHIS Pentest Lead

Getting Started In Pentesting – Advice From The BHIS Pentest Lead

Comments
1 min read
2026-04-06: SmartApeSG activity

2026-04-06: SmartApeSG activity

Comments
1 min read
AI in cybersecurity: The good, the bad, and the FUD

AI in cybersecurity: The good, the bad, and the FUD

Comments
1 min read
Year in Review: Vulnerabilities old and new and something React2

Year in Review: Vulnerabilities old and new and something React2

Comments
1 min read
New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations

New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations

Comments
1 min read
Financial cyberthreats in 2025 and the outlook for 2026

Financial cyberthreats in 2025 and the outlook for 2026

Comments
1 min read
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Comments
1 min read
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

Comments
1 min read
Cracks in the Bedrock: Agent God Mode

Cracks in the Bedrock: Agent God Mode

Comments
1 min read
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Comments
1 min read
Building a Detection Foundation: Part 5 - Correlation in Practice

Building a Detection Foundation: Part 5 - Correlation in Practice

Comments
1 min read
Cybersecurity in the Age of Instant Software

Cybersecurity in the Age of Instant Software

Comments
1 min read
2026-04-06: SmartApeSG activity

2026-04-06: SmartApeSG activity

Comments
1 min read
As breakout time accelerates, prevention-first cybersecurity takes center stage

As breakout time accelerates, prevention-first cybersecurity takes center stage

Comments
1 min read
Understanding Current Threats to Kubernetes Environments

Understanding Current Threats to Kubernetes Environments

Comments
1 min read
How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed

How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed

Comments
1 min read
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do

Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do

Comments
1 min read
Year in Review: Vulnerabilities old and new and something React2

Year in Review: Vulnerabilities old and new and something React2

Comments
1 min read
Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox

Comments
1 min read
Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

Comments
1 min read
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure

Comments
1 min read
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Comments
1 min read
Building a Detection Foundation: Part 5 - Correlation in Practice

Building a Detection Foundation: Part 5 - Correlation in Practice

Comments
1 min read
Cybersecurity in the Age of Instant Software

Cybersecurity in the Age of Instant Software

Comments
1 min read
2026-04-06: SmartApeSG activity

2026-04-06: SmartApeSG activity

Comments
1 min read
6th April – Threat Intelligence Report

6th April – Threat Intelligence Report

Comments
1 min read
Understanding Current Threats to Kubernetes Environments

Understanding Current Threats to Kubernetes Environments

Comments
1 min read
[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass

[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass

Comments
1 min read
Fortinet Issues Emergency Patch for FortiClient Zero-Day

Fortinet Issues Emergency Patch for FortiClient Zero-Day

Comments
1 min read
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Comments
1 min read
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit

Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit

Comments
1 min read
Elastic Security Integrations Roundup: Q1 2026

Elastic Security Integrations Roundup: Q1 2026

Comments
1 min read
Axios NPM supply chain incident

Axios NPM supply chain incident

Comments
1 min read
Do not get high(jacked) off your own supply (chain)

Do not get high(jacked) off your own supply (chain)

Comments
1 min read
Axios npm hack used fake Teams error fix to hijack maintainer account

Axios npm hack used fake Teams error fix to hijack maintainer account

Comments
1 min read
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

Comments
1 min read
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Comments
1 min read
When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications

When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 14

The Good, the Bad and the Ugly in Cybersecurity – Week 14

Comments
1 min read
New Mouse in the House: Zero-Point Security Training Joins the Fortra Family

New Mouse in the House: Zero-Point Security Training Joins the Fortra Family

Comments
1 min read
Elastic Security Integrations Roundup: Q1 2026

Elastic Security Integrations Roundup: Q1 2026

Comments
1 min read
loading...