DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Update: base64dump.py Version 0.0.29

Update: base64dump.py Version 0.0.29

Comments
1 min read
Update: emldump.py Version 0.0.16

Update: emldump.py Version 0.0.16

Comments
1 min read
Update: search-for-compression.py 0.0.6

Update: search-for-compression.py 0.0.6

Comments
1 min read
9th March – Threat Intelligence Report

9th March – Threat Intelligence Report

1
Comments
1 min read
TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense

TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense

Comments
1 min read
Falcon for XIoT Extends Asset Protection to Healthcare Environments

Falcon for XIoT Extends Asset Protection to Healthcare Environments

Comments
1 min read
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Comments
1 min read
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Comments
1 min read
Termite ransomware breaches linked to ClickFix CastleRAT attacks

Termite ransomware breaches linked to ClickFix CastleRAT attacks

Comments
1 min read
9th March – Threat Intelligence Report

9th March – Threat Intelligence Report

Comments
1 min read
TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense

TrendAI™ at [un]prompted 2026: From KYC Exploits to Agentic Defense

Comments
1 min read
Falcon for XIoT Extends Asset Protection to Healthcare Environments

Falcon for XIoT Extends Asset Protection to Healthcare Environments

Comments
1 min read
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Comments
1 min read
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Comments
1 min read
Termite ransomware breaches linked to ClickFix CastleRAT attacks

Termite ransomware breaches linked to ClickFix CastleRAT attacks

1
Comments
1 min read
Islands of Invariance

Islands of Invariance

1
Comments
1 min read
Patch diff to SYSTEM

Patch diff to SYSTEM

Comments
1 min read
Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app

Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app

Comments
1 min read
Hunting for malicious OpenClaw AI in the modern enterprise

Hunting for malicious OpenClaw AI in the modern enterprise

1
Comments
1 min read
Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild

Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild

Comments
1 min read
Building a Detection Foundation: Part 2 - Windows Security Events

Building a Detection Foundation: Part 2 - Windows Security Events

Comments
1 min read
Chinese state hackers target telcos with new malware toolkit

Chinese state hackers target telcos with new malware toolkit

Comments
1 min read
Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations

Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations

Comments
1 min read
UAT-9244 targets South American telecommunication providers with three new malware implants

UAT-9244 targets South American telecommunication providers with three new malware implants

Comments
1 min read
On the Effectiveness of Mutational Grammar Fuzzing

On the Effectiveness of Mutational Grammar Fuzzing

Comments
1 min read
Where Multi-Factor Authentication Stops and Credential Abuse Starts

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Comments
1 min read
The “P” in PAM is for Persistence: Linux Persistence Technique

The “P” in PAM is for Persistence: Linux Persistence Technique

Comments
1 min read
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft

Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft

Comments
1 min read
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Comments
1 min read
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Comments
1 min read
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Comments
1 min read
How a Brute Force Attack Unmasked a Ransomware Infrastructure Network

How a Brute Force Attack Unmasked a Ransomware Infrastructure Network

Comments
1 min read
Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

Comments
1 min read
Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations

Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations

Comments
1 min read
The “P” in PAM is for Persistence: Linux Persistence Technique

The “P” in PAM is for Persistence: Linux Persistence Technique

1
Comments
1 min read
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft

Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft

1
Comments
1 min read
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Comments
1 min read
Talos on the developing situation in the Middle East

Talos on the developing situation in the Middle East

1
Comments
1 min read
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Comments
1 min read
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Comments
1 min read
Overview of Content Published in February

Overview of Content Published in February

Comments
1 min read
Red Canary CFP tracker: March 2026

Red Canary CFP tracker: March 2026

Comments
1 min read
Silver Dragon Targets Organizations in Southeast Asia and Europe

Silver Dragon Targets Organizations in Southeast Asia and Europe

Comments
1 min read
CISOs in a Pinch: A Security Analysis of OpenClaw

CISOs in a Pinch: A Security Analysis of OpenClaw

Comments
1 min read
[webapps] WeGIA 3.5.0 - SQL Injection

[webapps] WeGIA 3.5.0 - SQL Injection

Comments
1 min read
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

1
Comments
1 min read
Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild

Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild

Comments
1 min read
Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

1
Comments
1 min read
Microsoft: Hackers abuse OAuth error flows to spread malware

Microsoft: Hackers abuse OAuth error flows to spread malware

1
Comments
1 min read
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft

Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft

Comments
1 min read
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit

Comments
1 min read
Talos on the developing situation in the Middle East

Talos on the developing situation in the Middle East

Comments
1 min read
Amazon: Drone strikes damaged AWS data centers in Middle East

Amazon: Drone strikes damaged AWS data centers in Middle East

Comments
1 min read
Overview of Content Published in February

Overview of Content Published in February

Comments
1 min read
2026-02-28: Traffic Analysis Exercise - Easy as 123

2026-02-28: Traffic Analysis Exercise - Easy as 123

Comments
1 min read
Red Canary CFP tracker: March 2026

Red Canary CFP tracker: March 2026

Comments
1 min read
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

1
Comments
1 min read
2nd March – Threat Intelligence Report

2nd March – Threat Intelligence Report

Comments
1 min read
This month in security with Tony Anscombe – February 2026 edition

This month in security with Tony Anscombe – February 2026 edition

Comments
1 min read
CrowdStrike Achieves NCSC CIR Assurance for Incident Response

CrowdStrike Achieves NCSC CIR Assurance for Incident Response

Comments
1 min read
loading...