National Cyber Warfare Foundation (NCWF) Forums


Blue Team (CND) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
Trail of Bits Buttercup heads to DARPA s AIxCC
0 user ratings
2024-08-10 00:11:50
By: milo
Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs
0 user ratings
2024-08-09 23:02:40
By: milo
Instagram is testing a Snap Maps-like feature that lets users post text and video updates to a map that can be shared with friends (Jacob Kastrenakes
0 user ratings
2024-08-09 23:00:33
By: milo
Preview of State of GitHub Actions Security Report: Security of GH Workflows Building Blocks
0 user ratings
2024-08-09 22:13:02
By: milo
White House to study open source software in critical infrastructure
0 user ratings
2024-08-09 20:59:36
By: milo
A Whopping 33% of Young American Are Exposed to Political Lies on TikTok
0 user ratings
2024-08-09 20:23:10
By: milo
USENIX Security 23 – Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities
0 user ratings
2024-08-09 19:44:29
By: milo
ATM Software Flaws Left Piles of Cash for Anyone Who Knew to Look
0 user ratings
2024-08-09 19:28:03
By: milo
ATM Software Flaws Left Buckets of Cash for Anyone Who Knew to Look
0 user ratings
2024-08-09 19:22:15
By: milo
Not Just Us: North Korean Remote IT Fraudster Arrested in Tennessee
0 user ratings
2024-08-09 19:07:10
By: milo
Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE
0 user ratings
2024-08-09 18:48:14
By: milo
Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines
0 user ratings
2024-08-09 18:44:08
By: milo
Five zero-days impacts EoL Cisco Small Business IP Phones. Replace them with newer models asap!
0 user ratings
2024-08-09 18:04:38
By: milo
Easterly: Cybersecurity is a software quality problem
0 user ratings
2024-08-09 17:54:35
By: milo
USENIX Security 23 – Trojan Source: Invisible Vulnerabilities
0 user ratings
2024-08-09 17:42:41
By: milo
Aqua Security Researchers Disclose Series of AWS Flaws
0 user ratings
2024-08-09 17:13:45
By: milo
A researcher shows five proof-of-concept ways that Copilot can be manipulated by attackers, including turning it into an automatic spear-phishing mach
0 user ratings
2024-08-09 17:05:45
By: milo
Intel details a microcode patch, available through BIOS updates, to address the elevated voltage issues that can damage some Core 13th and 14th Gen de
0 user ratings
2024-08-09 16:32:38
By: milo
#BHUSA: CISA Encourages Organizations to Adopt a 'Secure by Demand' Strategy
0 user ratings
2024-08-09 16:30:12
By: milo
FCC proposes consumer protections for AI-generated robocalls
0 user ratings
2024-08-09 16:06:03
By: milo
Intel details a microcode patch, available through BIOS updates, to address the elevated voltage issues that were damaging some of its 13th- and 14th-
0 user ratings
2024-08-09 15:58:36
By: milo
Exploring the dynamic landscape of cybersecurity threats
0 user ratings
2024-08-09 15:10:56
By: milo
IOActive researchers detail "Sinkclose", a vulnerability in almost all AMD chips dating back to 2006 that allows attackers to run code in Sy
0 user ratings
2024-08-09 14:25:55
By: milo
New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users
0 user ratings
2024-08-09 14:21:04
By: milo
Cybersecurity Insights with Contrast CISO David Lindner | 8 9 24
0 user ratings
2024-08-09 13:10:39
By: milo
This forum has 672 pages of posts.
 
all forums
new post



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.