DEV Community

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users [DEBUG 09:52:13]

Comments
1 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
This month in security with Tony Anscombe – January 2026 edition

This month in security with Tony Anscombe – January 2026 edition

Comments
1 min read
How Agentic Tool Chain Attacks Threaten AI Agent Security

How Agentic Tool Chain Attacks Threaten AI Agent Security

Comments
1 min read
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

Comments
1 min read
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 5

The Good, the Bad and the Ugly in Cybersecurity – Week 5

Comments
1 min read
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities

Comments
1 min read
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

Comments
1 min read
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

Comments
1 min read
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS

Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS

Comments
1 min read
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Comments
1 min read
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT

2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT

Comments
1 min read
2026-01-29: njRAT infection with MassLogger

2026-01-29: njRAT infection with MassLogger

Comments
1 min read
Dissecting UAT-8099: New persistence mechanisms and regional focus

Dissecting UAT-8099: New persistence mechanisms and regional focus

Comments
1 min read
Microsoft releases update to address zero-day vulnerability in Microsoft Office

Microsoft releases update to address zero-day vulnerability in Microsoft Office

Comments
1 min read
Supply chain attack on eScan antivirus: detecting and remediating malicious updates

Supply chain attack on eScan antivirus: detecting and remediating malicious updates

Comments
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Comments
1 min read
Understanding the Russian Cyber Threat to the 2026 Winter Olympics

Understanding the Russian Cyber Threat to the 2026 Winter Olympics

Comments
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware

2026-01-20: Lumma Stealer infection with follow-up malware

Comments
1 min read
Google disrupts IPIDEA residential proxy networks fueled by malware

Google disrupts IPIDEA residential proxy networks fueled by malware

Comments
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Comments
1 min read
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

Comments
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance

How Elastic Infosec Optimizes Defend for Cost and Performance

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
Cyber Security Report 2026

Cyber Security Report 2026

Comments
1 min read
Drowning in spam or scam emails? Here’s probably why

Drowning in spam or scam emails? Here’s probably why

Comments
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

Comments
1 min read
Data Protection Day 2026: From Compliance to Resilience

Data Protection Day 2026: From Compliance to Resilience

Comments
1 min read
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Comments
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware

2026-01-20: Lumma Stealer infection with follow-up malware

Comments
1 min read
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Comments
1 min read
SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

Comments
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Comments
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Comments
1 min read
Bypassing Windows Administrator Protection

Bypassing Windows Administrator Protection

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance

How Elastic Infosec Optimizes Defend for Cost and Performance

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

Comments
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

Comments
1 min read
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Comments
1 min read
Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days

Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days

Comments
1 min read
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation

Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation

Comments
1 min read
Over 6,000 SmarterMail servers exposed to automated hijacking attacks

Over 6,000 SmarterMail servers exposed to automated hijacking attacks

Comments
1 min read
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Comments
1 min read
Bypassing Windows Administrator Protection

Bypassing Windows Administrator Protection

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
26th January – Threat Intelligence Report

26th January – Threat Intelligence Report

Comments
1 min read
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

Comments
1 min read
New ClickFix attacks abuse Windows App-V scripts to push malware

New ClickFix attacks abuse Windows App-V scripts to push malware

Comments
1 min read
New malware service guarantees phishing extensions on Chrome web store

New malware service guarantees phishing extensions on Chrome web store

Comments
1 min read
New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Comments
1 min read
Bypassing Windows Administrator Protection

Bypassing Windows Administrator Protection

Comments
1 min read
Accelerate investigation and response with Red Canary and Zscaler Internet Access

Accelerate investigation and response with Red Canary and Zscaler Internet Access

Comments
1 min read
loading...