DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
2026-05-08: macOS Shub Stealer infection

2026-05-08: macOS Shub Stealer infection

Comments
1 min read
What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do

What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do

Comments
1 min read
CVE-2025-68670: discovering an RCE vulnerability in xrdp

CVE-2025-68670: discovering an RCE vulnerability in xrdp

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 19

The Good, the Bad and the Ugly in Cybersecurity – Week 19

Comments
1 min read
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

Comments
1 min read
CISA gives feds four days to patch Ivanti flaw exploited as zero-day

CISA gives feds four days to patch Ivanti flaw exploited as zero-day

Comments
1 min read
JDownloader site hacked to replace installers with Python RAT malware

JDownloader site hacked to replace installers with Python RAT malware

Comments
1 min read
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Comments
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access

The Accidental C2 - Exploring Dev Tunnels for Remote Access

Comments
2 min read
Spring cleaning your browser

Spring cleaning your browser

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 19

The Good, the Bad and the Ugly in Cybersecurity – Week 19

Comments
1 min read
Ivanti warns of new EPMM flaw exploited in zero-day attacks

Ivanti warns of new EPMM flaw exploited in zero-day attacks

Comments
1 min read
CISA gives feds four days to patch Ivanti flaw exploited as zero-day

CISA gives feds four days to patch Ivanti flaw exploited as zero-day

Comments
1 min read
JDownloader site hacked to replace installers with Python RAT malware

JDownloader site hacked to replace installers with Python RAT malware

Comments
1 min read
Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Copy Fail and DirtyFrag: Linux Page Cache Bugs in the Wild

Comments
1 min read
The Accidental C2 - Exploring Dev Tunnels for Remote Access

The Accidental C2 - Exploring Dev Tunnels for Remote Access

Comments
1 min read
AI-generated hunting leads: The hunt starts before you ask the question

AI-generated hunting leads: The hunt starts before you ask the question

Comments
1 min read
Know who to watch before the incident finds you

Know who to watch before the incident finds you

Comments
1 min read
Elastic Workflows GA: automation where your security data already lives

Elastic Workflows GA: automation where your security data already lives

Comments
1 min read
TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook

Comments
1 min read
Red Canary CFP tracker: May 2026

Red Canary CFP tracker: May 2026

Comments
1 min read
CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies

CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies

Comments
1 min read
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security

“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security

Comments
1 min read
Websites with an undefined trust level: avoiding the trap

Websites with an undefined trust level: avoiding the trap

Comments
1 min read
OceanLotus suspected of using PyPI to deliver ZiChatBot malware

OceanLotus suspected of using PyPI to deliver ZiChatBot malware

Comments
1 min read
Copy Fail: What You Need to Know About the Most Severe Linux Threat in Years

Copy Fail: What You Need to Know About the Most Severe Linux Threat in Years

Comments
1 min read
Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

Comments
1 min read
New stealthy Quasar Linux malware targets software developers

New stealthy Quasar Linux malware targets software developers

Comments
1 min read
Middle East Cyber Battle Field Broadens — Especially in UAE

Middle East Cyber Battle Field Broadens — Especially in UAE

Comments
1 min read
Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

Comments
1 min read
New stealthy Quasar Linux malware targets software developers

New stealthy Quasar Linux malware targets software developers

Comments
1 min read
Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

Comments
1 min read
Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

Comments
1 min read
Overview of Content Published in April

Overview of Content Published in April

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 18

The Good, the Bad and the Ugly in Cybersecurity – Week 18

Comments
1 min read
Tune In: The Future of AI-Powered Vulnerability Discovery

Tune In: The Future of AI-Powered Vulnerability Discovery

Comments
1 min read
Trellix Confirms Source Code Breach With Unauthorized Repository Access

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Comments
1 min read
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

Comments
1 min read
Telegram Mini Apps abused for crypto scams, Android malware delivery

Telegram Mini Apps abused for crypto scams, Android malware delivery

Comments
1 min read
Essential Data Sources for Detection Beyond the Endpoint

Essential Data Sources for Detection Beyond the Endpoint

Comments
1 min read
The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)

The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)

Comments
1 min read
Overview of Content Published in April

Overview of Content Published in April

Comments
1 min read
DFIR: From alert to root cause using Osquery without leaving Elastic Security

DFIR: From alert to root cause using Osquery without leaving Elastic Security

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 18

The Good, the Bad and the Ugly in Cybersecurity – Week 18

Comments
1 min read
Great responsibility, without great power

Great responsibility, without great power

Comments
1 min read
This month in security with Tony Anscombe – April 2026 edition

This month in security with Tony Anscombe – April 2026 edition

Comments
1 min read
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India

Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India

Comments
1 min read
Trellix Confirms Source Code Breach With Unauthorized Repository Access

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Comments
1 min read
Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

Comments
1 min read
That AI Extension Helping You Write Emails? It’s Reading Them First

That AI Extension Helping You Write Emails? It’s Reading Them First

Comments
1 min read
Essential Data Sources for Detection Beyond the Endpoint

Essential Data Sources for Detection Beyond the Endpoint

Comments
1 min read
The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)

The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)

Comments
1 min read
Fast16 Malware

Fast16 Malware

Comments
1 min read
CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

Comments
1 min read
CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring

CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring

Comments
1 min read
27th April – Threat Intelligence Report

27th April – Threat Intelligence Report

Comments
1 min read
[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)

[local] OpenWrt 23.05 - Authenticated Remote Code Execution (RCE)

Comments
1 min read
2026-04-22: Malicious ad leads to ClickFix-style page for macOS malware

2026-04-22: Malicious ad leads to ClickFix-style page for macOS malware

Comments
1 min read
CI/CD pipeline abuse: the problem no one is watching

CI/CD pipeline abuse: the problem no one is watching

Comments
1 min read
What Anthropic’s Mythos Means for the Future of Cybersecurity

What Anthropic’s Mythos Means for the Future of Cybersecurity

Comments
1 min read
loading...