<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Mark0</title>
    <description>The latest articles on Forem by Mark0 (@mark0_617b45cda9782a).</description>
    <link>https://forem.com/mark0_617b45cda9782a</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3702447%2F0301e2c9-634f-4567-8171-fd5d9da0b3aa.jpg</url>
      <title>Forem: Mark0</title>
      <link>https://forem.com/mark0_617b45cda9782a</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/mark0_617b45cda9782a"/>
    <language>en</language>
    <item>
      <title>Update: cut-bytes.py Version 0.0.18</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:06:27 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/update-cut-bytespy-version-0018-hm0</link>
      <guid>https://forem.com/mark0_617b45cda9782a/update-cut-bytespy-version-0018-hm0</guid>
      <description>&lt;p&gt;This update for &lt;code&gt;cut-bytes.py&lt;/code&gt; (version 0.0.18) addresses compatibility issues with the latest Python releases. Specifically, it provides a fix for escape sequences that previously triggered warnings in modern Python environments, ensuring the tool remains functional and silent during execution.&lt;/p&gt;

&lt;p&gt;The release includes direct download links for the updated software package in ZIP format. To ensure file integrity, the author has provided both MD5 and SHA256 hashes for verification, a standard practice for maintaining security when distributing forensic and analysis tools.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://blog.didierstevens.com/2026/04/19/update-cut-bytes-py-version-0-0-18/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>python</category>
      <category>software</category>
    </item>
    <item>
      <title>Some unintelligent fun with ms-notepad protocol</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:05:54 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/some-unintelligent-fun-with-ms-notepad-protocol-4b0c</link>
      <guid>https://forem.com/mark0_617b45cda9782a/some-unintelligent-fun-with-ms-notepad-protocol-4b0c</guid>
      <description>&lt;p&gt;The article explores the "ms-notepad://" protocol handler introduced in recent Windows 11 builds. The researcher demonstrates how this handler can be used to launch the Notepad application via custom URI links, highlighting its behavior when handling filename arguments and the resulting file path resolution, including attempts at directory traversal using relative paths.&lt;/p&gt;

&lt;p&gt;Furthermore, the analysis reveals a &lt;code&gt;/TESTING&lt;/code&gt; command line argument within the new Notepad version that processes Base64 encoded strings to resolve file paths. This discovery allows for opening specific files through both the command line and the protocol handler, suggesting that the continuous addition of URI-based protocols in Windows provides an expanding attack surface for security research.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.hexacorn.com/blog/2026/04/22/some-unintelligent-fun-with-ms-notepad-protocol/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>windows</category>
      <category>research</category>
    </item>
    <item>
      <title>Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:05:15 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity-3h2f</link>
      <guid>https://forem.com/mark0_617b45cda9782a/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity-3h2f</guid>
      <description>&lt;p&gt;Modern cybersecurity is shifting from human-centric to machine-speed defense, driven by the integration of AI and automation. While automation acts as the operational multiplier to handle increasing alert volumes and reclaiming defensive tempo, AI provides the necessary context and predictive intelligence to guide these automated workflows. This synergy allows security teams to move from reactive triage to proactive intervention.&lt;/p&gt;

&lt;p&gt;Adversaries are leveraging similar technologies for AI-assisted phishing, polymorphic malware, and automated lateral movement, compressing the attack lifecycle significantly. To counter this, organizations are adopting agentic AI systems—such as SentinelOne’s Purple AI—that perform autonomous investigations under human-defined guardrails. The future of security operations depends on the intelligent orchestration of people and machines, ensuring that detection, investigation, and response happen autonomously and in parallel.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.sentinelone.com/blog/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>automation</category>
      <category>ai</category>
    </item>
    <item>
      <title>What the ransom note won't say</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:04:35 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/what-the-ransom-note-wont-say-471k</link>
      <guid>https://forem.com/mark0_617b45cda9782a/what-the-ransom-note-wont-say-471k</guid>
      <description>&lt;p&gt;Ransomware has evolved from simple extortion into a sophisticated franchise-based industry known as Ransomware-as-a-Service (RaaS). This model allows specialized actors—developers, access brokers, and affiliates—to operate efficiently at scale, targeting smaller organizations with lower ransom demands to maintain a high-volume business. The market remains resilient even under law enforcement pressure, as affiliates quickly migrate between groups when operations are disrupted, illustrating a professionalized ecosystem driven by economic incentives.&lt;/p&gt;

&lt;p&gt;The technical landscape is defined by the 'Red Queen effect,' where attackers and defenders adapt in parallel. This is most evident in the rise of 'EDR killers' and Bring Your Own Vulnerable Driver (BYOVD) techniques used to disable security products at the kernel level. As AI begins to lower the barrier to entry for malware development, organizations must move beyond viewing ransomware as a random event and instead treat it as a professionalized industry that requires proactive monitoring of evolving tools and supply chain risks.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.welivesecurity.com/en/ransomware/what-ransom-note-doesnt-say/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>malware</category>
      <category>ransomware</category>
    </item>
    <item>
      <title>FakeWallet crypto stealer spreading through iOS apps in the App Store</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:03:40 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/fakewallet-crypto-stealer-spreading-through-ios-apps-in-the-app-store-49j1</link>
      <guid>https://forem.com/mark0_617b45cda9782a/fakewallet-crypto-stealer-spreading-through-ios-apps-in-the-app-store-49j1</guid>
      <description>&lt;p&gt;In March 2026, researchers identified over twenty phishing apps in the Apple App Store masquerading as popular crypto wallets like MetaMask and Ledger. These apps utilize typosquatting and functional placeholders to bypass store filters, eventually redirecting users to install trojanized versions via iOS provisioning profiles. The campaign specifically targets recovery phrases and private keys, with evidence suggesting it has been active since late 2025.&lt;/p&gt;

&lt;p&gt;The technical execution involves sophisticated methods such as malicious library injection (dylib) and modifying React Native source code to hijack wallet creation and recovery screens. By substituting legitimate class methods with malicious versions, the attackers exfiltrate mnemonic phrases encrypted with RSA to remote C2 servers. The campaign, which shows links to the SparkKitty Trojan, primarily targets Chinese-speaking users but remains a global threat due to its ability to adapt to different system locales.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://securelist.com/fakewallet-cryptostealer-ios-app-store/119474/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>mobile</category>
      <category>cryptosecurity</category>
    </item>
    <item>
      <title>Introducing the CrowdStrike Shadow AI Visibility Service</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:02:54 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/introducing-the-crowdstrike-shadow-ai-visibility-service-3f80</link>
      <guid>https://forem.com/mark0_617b45cda9782a/introducing-the-crowdstrike-shadow-ai-visibility-service-3f80</guid>
      <description>&lt;p&gt;CrowdStrike's Professional Services team has observed that organizations consistently underestimate their AI tool inventory, often discovering significantly more active agents and services than initially reported. Many organizations rely on web filtering which creates a false sense of control while masking unapproved AI activity occurring across endpoints, cloud, and SaaS environments.&lt;/p&gt;

&lt;p&gt;To address this visibility gap, the new CrowdStrike Shadow AI Visibility Service utilizes the Falcon platform to provide an accurate map of an organization's AI footprint. The service identifies risks associated with shadow AI, including desktop applications, browser extensions, and development frameworks, while monitoring user prompts and LLM responses for potential leaks of sensitive data or source code.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-shadow-AI-visibility-service/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>ai</category>
      <category>shadowai</category>
    </item>
    <item>
      <title>CrowdStrike Falcon Platform Achieves 441% ROI in Three Years</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:02:23 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/crowdstrike-falcon-platform-achieves-441-roi-in-three-years-fm1</link>
      <guid>https://forem.com/mark0_617b45cda9782a/crowdstrike-falcon-platform-achieves-441-roi-in-three-years-fm1</guid>
      <description>&lt;p&gt;A new IDC Business Value study highlights the significant financial and operational advantages of consolidating security tools onto the CrowdStrike Falcon platform. Organizations transitioning to this unified architecture reported a 441% return on investment over three years, with initial costs recovered within just four months. By replacing an average of five disparate security tools with a single platform, enterprises successfully reduced tool sprawl and simplified their security environments.&lt;/p&gt;

&lt;p&gt;The study further reveals that standardizing on Falcon led to an 86% reduction in false positives and a 44% improvement in security operations efficiency. This shift allows security teams to move away from managing alert noise and manual triaging, instead focusing on proactive threat hunting and innovation. The platform's AI-native foundation provides the necessary visibility across endpoint, identity, and cloud environments to counter increasingly sophisticated adversaries.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-falcon-platform-achieves-441-percent-roi-in-three-years/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>automation</category>
      <category>cloudsecurity</category>
    </item>
    <item>
      <title>Fracturing Software Security With Frontier AI Models</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:01:43 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/fracturing-software-security-with-frontier-ai-models-30f5</link>
      <guid>https://forem.com/mark0_617b45cda9782a/fracturing-software-security-with-frontier-ai-models-30f5</guid>
      <description>&lt;p&gt;Unit 42's research into frontier AI models reveals a significant shift in the speed and scale of vulnerability discovery. These models are evolving from coding assistants to full-spectrum security researchers capable of autonomous reasoning. This advancement allows for autonomous zero-day discovery, the collapse of patching windows for N-days, and the development of complex exploit chains that can adapt in real-time to bypass hardened environment controls.&lt;/p&gt;

&lt;p&gt;The risk is particularly acute for Open Source Software (OSS) due to code transparency, which AI models can analyze more effectively than compiled binaries. Unit 42 predicts an increase in large-scale supply chain compromises as threat actors leverage AI for reconnaissance, initial access via sophisticated spear-phishing, and autonomous lateral movement. To counter these threats, security teams must move toward aggressive prevention, automated incident response, and hardened architectural barriers like memory-safe languages.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://unit42.paloaltonetworks.com/ai-software-security-risks/" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>ai</category>
      <category>threatintelligence</category>
    </item>
    <item>
      <title>Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:01:04 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/void-dokkaebi-uses-fake-job-interview-lure-to-spread-malware-via-code-repositories-40jb</link>
      <guid>https://forem.com/mark0_617b45cda9782a/void-dokkaebi-uses-fake-job-interview-lure-to-spread-malware-via-code-repositories-40jb</guid>
      <description>&lt;p&gt;Void Dokkaebi (also known as Famous Chollima), a North Korea-aligned threat actor, is targeting software developers through a sophisticated campaign involving fake job interviews. The group lures developers into cloning malicious repositories that utilize Visual Studio Code's workspace task system to execute malware. This operation has evolved from targeted social engineering into a self-propagating supply chain threat, as compromised developers unknowingly commit malicious configurations and obfuscated JavaScript back into organizational and open-source repositories.&lt;/p&gt;

&lt;p&gt;The campaign features advanced evasion techniques, including commit history tampering to hide malicious injections and the use of blockchain infrastructure (Tron, Aptos, and Binance Smart Chain) for payload staging. The primary payload is a variant of the DEV#POPPER remote access trojan (RAT), which enables multi-operator session management and specifically avoids CI/CD environments to evade detection. Analysts have identified over 750 infected repositories, highlighting a significant risk to the broader developer ecosystem and software supply chains.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.trendmicro.com/en_us/research/26/d/void-dokkaebi-uses-fake-job-interview-lure-to-spread-malware-via-code-repositories.html" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>malware</category>
      <category>devsecops</category>
    </item>
    <item>
      <title>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 05:00:27 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain-464f</link>
      <guid>https://forem.com/mark0_617b45cda9782a/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain-464f</guid>
      <description>&lt;p&gt;Cybersecurity researchers have identified a critical systemic vulnerability in Anthropic's Model Context Protocol (MCP) SDK architecture. The flaw, which stems from unsafe defaults in the STDIO transport interface, enables remote code execution (RCE) across various programming languages including Python, TypeScript, and Rust. This "by design" weakness affects over 7,000 publicly accessible servers and has impacted popular AI projects like LangChain and LiteLLM, creating a significant risk for the AI supply chain.&lt;/p&gt;

&lt;p&gt;Despite the discovery of over 10 CVEs related to this issue, Anthropic has declined to modify the protocol's architecture, citing the behavior as expected. This leaves the responsibility of mitigation to downstream developers, who must now implement sandboxing and strict input validation to prevent command injection. The incident underscores the hidden dangers of architectural decisions in AI protocols that can propagate silently throughout an entire ecosystem.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>ai</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 04:59:53 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files-30h2</link>
      <guid>https://forem.com/mark0_617b45cda9782a/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files-30h2</guid>
      <description>&lt;p&gt;A critical security vulnerability, tracked as CVE-2026-5760, has been discovered in SGLang, a high-performance serving framework for large language models. With a CVSS score of 9.8, this flaw allows for remote code execution (RCE) through the &lt;code&gt;/v1/rerank&lt;/code&gt; endpoint. The vulnerability arises from the insecure use of the Jinja2 rendering engine without proper sandboxing, specifically when processing malicious model files.&lt;/p&gt;

&lt;p&gt;Attackers can exploit this by creating malicious GPT-Generated Unified Format (GGUF) model files containing a Server-Side Template Injection (SSTI) payload within the &lt;code&gt;tokenizer.chat_template&lt;/code&gt; parameter. When a victim loads the model and accesses the vulnerable endpoint, the malicious code executes in the context of the SGLang service. Security experts recommend switching to &lt;code&gt;ImmutableSandboxedEnvironment&lt;/code&gt; to mitigate this threat, as no official patch was confirmed during the initial coordination process.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>vulnerability</category>
      <category>rce</category>
    </item>
    <item>
      <title>SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation</title>
      <dc:creator>Mark0</dc:creator>
      <pubDate>Wed, 22 Apr 2026 04:59:20 +0000</pubDate>
      <link>https://forem.com/mark0_617b45cda9782a/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation-530b</link>
      <guid>https://forem.com/mark0_617b45cda9782a/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation-530b</guid>
      <description>&lt;p&gt;Researchers have identified a significant expansion in the operations of "The Gentlemen" ransomware-as-a-service (RaaS), which has recently integrated the SystemBC proxy malware to facilitate network tunneling and lateral movement. By utilizing custom RC4-encrypted protocols and SOCKS5 tunnels, the group has compromised over 1,570 corporate networks. The group demonstrates high technical proficiency, targeting diverse platforms including Windows, Linux, and ESXi, while employing advanced evasion techniques like disabling Windows Defender through PowerShell scripts and abusing Group Policy Objects (GPOs) for domain-wide impact.&lt;/p&gt;

&lt;p&gt;The broader ransomware landscape is shifting toward extreme specialization and reduced dwell times, with groups like Akira achieving full encryption in under an hour. Emerging families like Kyber are focusing on specific environments such as VMware ESXi using Rust and C++ encryptors. Despite increased law enforcement pressure, the ecosystem remains industrialized and resilient, with attackers increasingly targeting small to mid-sized organizations and operational technology (OT) environments during off-peak hours to bypass defensive responses.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;&lt;a href="https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html" rel="noopener noreferrer"&gt;Read Full Article&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>malware</category>
      <category>ransomware</category>
    </item>
  </channel>
</rss>
