DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Supercharge Your SOC

Supercharge Your SOC

Comments
1 min read
Streamlining the Security Analyst Experience

Streamlining the Security Analyst Experience

Comments
1 min read
Security Automation with Elastic Workflows: From Alert to Response

Security Automation with Elastic Workflows: From Alert to Response

Comments
1 min read
Investigating from the Endpoint Across Your Environment with Elastic Security XDR

Investigating from the Endpoint Across Your Environment with Elastic Security XDR

Comments
1 min read
2025 Talos Year in Review: Speed, scale, and staying power

2025 Talos Year in Review: Speed, scale, and staying power

Comments
1 min read
Beers with Talos breaks down the 2025 Talos Year in Review

Beers with Talos breaks down the 2025 Talos Year in Review

Comments
1 min read
New CrowdStrike Innovations Secure AI Agents and Govern Shadow AI Across Endpoints, SaaS, and Cloud

New CrowdStrike Innovations Secure AI Agents and Govern Shadow AI Across Endpoints, SaaS, and Cloud

Comments
1 min read
23rd March – Threat Intelligence Report

23rd March – Threat Intelligence Report

Comments
1 min read
Falcon Next-Gen SIEM Supports Third-Party EDR Tools, Starting with Microsoft Defender

Falcon Next-Gen SIEM Supports Third-Party EDR Tools, Starting with Microsoft Defender

Comments
1 min read
We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

Comments
1 min read
VoidStealer malware steals Chrome master key via debugger trick

VoidStealer malware steals Chrome master key via debugger trick

Comments
1 min read
FBI warns of Handala hackers using Telegram in malware attacks

FBI warns of Handala hackers using Telegram in malware attacks

Comments
1 min read
M-Trends 2026: Data, Insights, and Strategies From the Frontlines

M-Trends 2026: Data, Insights, and Strategies From the Frontlines

Comments
1 min read
Move fast and save things: A quick guide to recovering a hacked account

Move fast and save things: A quick guide to recovering a hacked account

Comments
1 min read
Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Comments
1 min read
Oracle pushes emergency fix for critical Identity Manager RCE flaw

Oracle pushes emergency fix for critical Identity Manager RCE flaw

Comments
1 min read
VoidStealer malware steals Chrome master key via debugger trick

VoidStealer malware steals Chrome master key via debugger trick

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good, the Bad and the Ugly in Cybersecurity – Week 12

Comments
1 min read
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Comments
1 min read
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Comments
1 min read
Intelligence Insights: March 2026

Intelligence Insights: March 2026

Comments
1 min read
Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown

Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown

Comments
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Comments
1 min read
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook

Everyday tools, extraordinary crimes: the ransomware exfiltration playbook

Comments
1 min read
You have to invite them in

You have to invite them in

1
Comments
1 min read
EDR killers explained: Beyond the drivers

EDR killers explained: Beyond the drivers

Comments
1 min read
Analyzing the Current State of AI Use in Malware

Analyzing the Current State of AI Use in Malware

Comments
1 min read
Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Who’s Really Shopping? Retail Fraud in the Age of Agentic AI

Comments
1 min read
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

Comments
1 min read
Oracle pushes emergency fix for critical Identity Manager RCE flaw

Oracle pushes emergency fix for critical Identity Manager RCE flaw

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 12

The Good, the Bad and the Ugly in Cybersecurity – Week 12

Comments
1 min read
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Comments
1 min read
How to Lead Effective Tabletops

How to Lead Effective Tabletops

Comments
1 min read
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

Comments
1 min read
2026-03-17: Seven days of scans and probes and web traffic hitting my web server

2026-03-17: Seven days of scans and probes and web traffic hitting my web server

Comments
1 min read
Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

Linux & Cloud Detection Engineering - TeamPCP Container Attack Scenario

1
Comments
1 min read
AI and browser threats stand out in the 2026 Threat Detection Report

AI and browser threats stand out in the 2026 Threat Detection Report

Comments
1 min read
Intelligence Insights: March 2026

Intelligence Insights: March 2026

Comments
1 min read
SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS

Comments
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Comments
1 min read
Analyzing the Current State of AI Use in Malware

Analyzing the Current State of AI Use in Malware

Comments
1 min read
From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

From Invitation to Infection: How SILENTCONNECT Delivers ScreenConnect

Comments
1 min read
Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Linux & Cloud Detection Engineering - Getting Started with Defend for Containers (D4C)

Comments
1 min read
Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found

Comments
1 min read
ConnectWise patches new flaw allowing ScreenConnect hijacking

ConnectWise patches new flaw allowing ScreenConnect hijacking

Comments
1 min read
Why East-West Visibility Matters for Grid Security

Why East-West Visibility Matters for Grid Security

Comments
1 min read
Transparent COM instrumentation for malware analysis

Transparent COM instrumentation for malware analysis

Comments
1 min read
C2 Implant 'SnappyClient' Targets Crypto Wallets

C2 Implant 'SnappyClient' Targets Crypto Wallets

Comments
1 min read
Ransomware gang exploits Cisco flaw in zero-day attacks since January

Ransomware gang exploits Cisco flaw in zero-day attacks since January

1
Comments
1 min read
From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

1
Comments
1 min read
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors

Comments
1 min read
How to Lead Effective Tabletops

How to Lead Effective Tabletops

Comments
1 min read
Better Together: Combining Automation and Manual Testing

Better Together: Combining Automation and Manual Testing

1
Comments
1 min read
Update: oledump.py Version 0.0.85

Update: oledump.py Version 0.0.85

Comments
1 min read
2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

2026-03-12: Files for an ISC diary (SmartApeSG ClickFix pushes Remcos RAT)

1
Comments
1 min read
2026-03-17: Seven days of scans and probes and web traffic hitting my web server

2026-03-17: Seven days of scans and probes and web traffic hitting my web server

Comments
1 min read
AI and browser threats stand out in the 2026 Threat Detection Report

AI and browser threats stand out in the 2026 Threat Detection Report

Comments
1 min read
UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection

UPDATE: Ant Group Censors 4 Security Research Articles After Initial Complaint Rejection

1
Comments
1 min read
Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models

Comments
1 min read
Get started with Elastic Security from your AI agent

Get started with Elastic Security from your AI agent

Comments
1 min read
loading...