Forem

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Social Engineering and Microsoft SSPR: The Road to Pwnage is Paved with Good Intentions 

Comments
1 min read
LDAP Channel Binding and LDAP Signing

LDAP Channel Binding and LDAP Signing

Comments
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT

2026-01-22: SmartApeSG uses ClickFix technique to push Remcos RAT

Comments
1 min read
2026-01-29: njRAT infection with MassLogger

2026-01-29: njRAT infection with MassLogger

Comments
1 min read
Dissecting UAT-8099: New persistence mechanisms and regional focus

Dissecting UAT-8099: New persistence mechanisms and regional focus

Comments
1 min read
Microsoft releases update to address zero-day vulnerability in Microsoft Office

Microsoft releases update to address zero-day vulnerability in Microsoft Office

Comments
1 min read
Supply chain attack on eScan antivirus: detecting and remediating malicious updates

Supply chain attack on eScan antivirus: detecting and remediating malicious updates

Comments
1 min read
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)

Comments
1 min read
Understanding the Russian Cyber Threat to the 2026 Winter Olympics

Understanding the Russian Cyber Threat to the 2026 Winter Olympics

Comments
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware

2026-01-20: Lumma Stealer infection with follow-up malware

Comments
1 min read
Google disrupts IPIDEA residential proxy networks fueled by malware

Google disrupts IPIDEA residential proxy networks fueled by malware

Comments
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Comments
1 min read
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

Comments
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance

How Elastic Infosec Optimizes Defend for Cost and Performance

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
Cyber Security Report 2026

Cyber Security Report 2026

Comments
1 min read
Drowning in spam or scam emails? Here’s probably why

Drowning in spam or scam emails? Here’s probably why

Comments
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

Comments
1 min read
Data Protection Day 2026: From Compliance to Resilience

Data Protection Day 2026: From Compliance to Resilience

Comments
1 min read
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Comments
1 min read
2026-01-20: Lumma Stealer infection with follow-up malware

2026-01-20: Lumma Stealer infection with follow-up malware

Comments
1 min read
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Comments
1 min read
SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws

Comments
1 min read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Comments
1 min read
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network

Comments
1 min read
Bypassing Windows Administrator Protection

Bypassing Windows Administrator Protection

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
How Elastic Infosec Optimizes Defend for Cost and Performance

How Elastic Infosec Optimizes Defend for Cost and Performance

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

Comments
1 min read
HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

HoneyMyte updates CoolClient and deploys multiple stealers in recent campaigns

Comments
1 min read
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Comments
1 min read
Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days

Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days

Comments
1 min read
Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation

Microsoft Office Zero-Day (CVE-2026-21509) - Emergency Patch Issued for Active Exploitation

Comments
1 min read
Over 6,000 SmarterMail servers exposed to automated hijacking attacks

Over 6,000 SmarterMail servers exposed to automated hijacking attacks

Comments
1 min read
Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Comments
1 min read
Bypassing Windows Administrator Protection

Bypassing Windows Administrator Protection

Comments
1 min read
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088

Comments
1 min read
The key of AI: How Agentic Tuning can make your detection strategy sing

The key of AI: How Agentic Tuning can make your detection strategy sing

Comments
1 min read
26th January – Threat Intelligence Report

26th January – Threat Intelligence Report

Comments
1 min read
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

Comments
1 min read
New ClickFix attacks abuse Windows App-V scripts to push malware

New ClickFix attacks abuse Windows App-V scripts to push malware

Comments
1 min read
New malware service guarantees phishing extensions on Chrome web store

New malware service guarantees phishing extensions on Chrome web store

Comments
1 min read
New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Comments
1 min read
Bypassing Windows Administrator Protection

Bypassing Windows Administrator Protection

Comments
1 min read
Accelerate investigation and response with Red Canary and Zscaler Internet Access

Accelerate investigation and response with Red Canary and Zscaler Internet Access

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 4

The Good, the Bad and the Ugly in Cybersecurity – Week 4

Comments
1 min read
Children and chatbots: What parents should know

Children and chatbots: What parents should know

Comments
1 min read
Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense

Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense

Comments
1 min read
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

Comments
1 min read
New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

Comments
1 min read
Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026

Hackers get $1,047,000 for 76 zero-days at Pwn2Own Automotive 2026

Comments
1 min read
AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities

AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities

Comments
1 min read
Why AI Keeps Falling for Prompt Injection Attacks

Why AI Keeps Falling for Prompt Injection Attacks

Comments
1 min read
North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews

Comments
1 min read
Clear skies ahead with Wiz visibility and Red Canary MDR

Clear skies ahead with Wiz visibility and Red Canary MDR

Comments
1 min read
19th January – Threat Intelligence Report

19th January – Threat Intelligence Report

Comments
1 min read
loading...