Forem

Mark0 profile picture

Mark0

404 bio not found

Joined Joined on 
Update: cut-bytes.py Version 0.0.18

Update: cut-bytes.py Version 0.0.18

Comments
1 min read
Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity

Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity

Comments
1 min read
DFIR Report – The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy

DFIR Report – The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy

Comments
1 min read
20th April – Threat Intelligence Report

20th April – Threat Intelligence Report

Comments
1 min read
FakeWallet crypto stealer spreading through iOS apps in the App Store

FakeWallet crypto stealer spreading through iOS apps in the App Store

Comments
1 min read
Frontier AI Is Collapsing the Exploit Window. Here’s How Defenders Must Respond.

Frontier AI Is Collapsing the Exploit Window. Here’s How Defenders Must Respond.

Comments
1 min read
Fracturing Software Security With Frontier AI Models

Fracturing Software Security With Frontier AI Models

Comments
1 min read
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Comments
1 min read
Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

Comments
1 min read
SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

Comments
1 min read
Update: cut-bytes.py Version 0.0.18

Update: cut-bytes.py Version 0.0.18

Comments
1 min read
That data breach alert might be a trap

That data breach alert might be a trap

Comments
1 min read
Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)

Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)

Comments
1 min read
Vercel confirms breach as hackers claim to be selling stolen data

Vercel confirms breach as hackers claim to be selling stolen data

Comments
1 min read
A few more protocol handlers :), Part 2

A few more protocol handlers :), Part 2

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 16

The Good, the Bad and the Ugly in Cybersecurity – Week 16

Comments
1 min read
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Comments
1 min read
Mythos, Memory Loss, and the Part InfoSec Keeps Missing

Mythos, Memory Loss, and the Part InfoSec Keeps Missing

Comments
1 min read
WerReportCreate API

WerReportCreate API

Comments
1 min read
2026-04-16: Files for an ISC diary (Lumma Stealer infection with Sectop RAT/ArechClient2)

2026-04-16: Files for an ISC diary (Lumma Stealer infection with Sectop RAT/ArechClient2)

Comments
1 min read
That data breach alert might be a trap

That data breach alert might be a trap

Comments
1 min read
Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)

Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)

Comments
1 min read
PowMix botnet targets Czech workforce

PowMix botnet targets Czech workforce

Comments
1 min read
A few more protocol handlers :), Part 2

A few more protocol handlers :), Part 2

Comments
1 min read
More than pretty pictures: Wendy Bishop on visual storytelling in tech

More than pretty pictures: Wendy Bishop on visual storytelling in tech

Comments
1 min read
A Deep Dive Into Attempted Exploitation of CVE-2023-33538

A Deep Dive Into Attempted Exploitation of CVE-2023-33538

Comments
1 min read
Frontier AI Reinforces the Future of Modern Cyber Defense

Frontier AI Reinforces the Future of Modern Cyber Defense

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 16

The Good, the Bad and the Ugly in Cybersecurity – Week 16

Comments
1 min read
Mythos and Cybersecurity

Mythos and Cybersecurity

Comments
1 min read
Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Comments
1 min read
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Comments
1 min read
Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Defending Your Enterprise When AI Models Can Find Vulnerabilities Faster Than Ever

Comments
1 min read
⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

Comments
1 min read
Benchmarking Self-Hosted LLMs for Offensive Security

Benchmarking Self-Hosted LLMs for Offensive Security

Comments
1 min read
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Comments
1 min read
State-sponsored threats: Different objectives, similar access paths

State-sponsored threats: Different objectives, similar access paths

Comments
1 min read
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities

Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities

Comments
1 min read
SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS

SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) & cloud/SaaS

Comments
1 min read
JanelaRAT: a financial threat targeting users in Latin America

JanelaRAT: a financial threat targeting users in Latin America

Comments
1 min read
2026-04-13: XLoader (Formbook) infection

2026-04-13: XLoader (Formbook) infection

Comments
1 min read
New: Use response actions to update Zscaler policies and block threats

New: Use response actions to update Zscaler policies and block threats

Comments
1 min read
Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack

Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack

Comments
1 min read
Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Comments
1 min read
⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

Comments
1 min read
5 Ways Zero Trust Maximizes Identity Security

5 Ways Zero Trust Maximizes Identity Security

Comments
1 min read
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT

Comments
1 min read
13th April – Threat Intelligence Report

13th April – Threat Intelligence Report

Comments
1 min read
JanelaRAT: a financial threat targeting users in Latin America

JanelaRAT: a financial threat targeting users in Latin America

Comments
1 min read
On Anthropic’s Mythos Preview and Project Glasswing

On Anthropic’s Mythos Preview and Project Glasswing

Comments
1 min read
Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

Comments
1 min read
Siemens Healthineers with Special Guest Javier Azofra Ovejero

Siemens Healthineers with Special Guest Javier Azofra Ovejero

Comments
1 min read
[Video] The TTP Ep. 22: The Collapse of the Patch Window

[Video] The TTP Ep. 22: The Collapse of the Patch Window

Comments
1 min read
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Comments
1 min read
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

Comments
1 min read
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Comments
1 min read
Critical Marimo pre-auth RCE flaw now under active exploitation

Critical Marimo pre-auth RCE flaw now under active exploitation

Comments
1 min read
Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Recovery scammers hit you when you’re down: Here’s how to avoid a second strike

Comments
1 min read
[local] NetBT e-Fatura - Privilege Escalation

[local] NetBT e-Fatura - Privilege Escalation

Comments
1 min read
The Good, the Bad and the Ugly in Cybersecurity – Week 15

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Comments
1 min read
loading...