National Cyber Warfare Foundation (NCWF) Forums


Blue Team (CND)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Windows Downdate Attacks, Quick Share Vulnerability Exploit, and More: Hacker s Playbook Threat Coverage Round-up: August 2024
0 user ratings
2024-08-27 20:13:40
By: milo
Seeing the Unseen: How Generative AI Elevates Situational Awareness in Cybersecurity
0 user ratings
2024-08-27 20:13:40
By: milo
China-linked APT Volt Typhoon exploited a zero-day in Versa Director
0 user ratings
2024-08-27 20:11:29
By: milo
Chinese hackers exploited bug to compromise internet companies, cybersecurity firm says - Reuters
0 user ratings
2024-08-27 19:47:04
By: milo
Chinese hackers exploited bug to compromise internet companies, cybersecurity firm says - Hindustan Times
0 user ratings
2024-08-27 19:20:15
By: milo
Chinese hackers exploited bug to compromise internet companies: security firm - South China Morning Post
0 user ratings
2024-08-27 19:20:14
By: milo
How fernao magellan Customized 140 Automation Use Cases
0 user ratings
2024-08-27 19:14:42
By: milo
The Urgent Need to Get MOVING for PCI DSS v4.0 Compliance
0 user ratings
2024-08-27 19:14:42
By: milo
How to Comply with APRA Prudential Standard CPS 234
0 user ratings
2024-08-27 18:13:46
By: milo
What s New in CJIS 5.9.5 as it Relates to Firmware Security?
0 user ratings
2024-08-27 18:13:45
By: milo
How to Strengthen Your SaaS Security Posture Management
0 user ratings
2024-08-27 17:41:40
By: milo
New Password Hacking Warning For Gmail, Facebook And Amazon Users - Forbes
0 user ratings
2024-08-27 17:20:16
By: milo
Terrorgram Telegram Terrorists Trash Transformers Grid in Peril
0 user ratings
2024-08-27 17:20:05
By: milo
What is RBAC (Role-Based Access Control) and Why is it Important?
0 user ratings
2024-08-27 17:14:45
By: milo
Ghostwriter Tool Integration
0 user ratings
2024-08-27 17:14:44
By: milo
New Unicode QR Code Phishing Scam Bypasses Traditional Security
0 user ratings
2024-08-27 17:08:26
By: milo
The crypto industry, heavily reliant on Telegram, has been Pavel Durov's loudest defender after his arrest; the Telegram-linked TON coin has a $1
0 user ratings
2024-08-27 17:03:27
By: milo
Chinese hackers exploited bug to compromise internet companies, cybersecurity firm says - Yahoo Canada Finance
0 user ratings
2024-08-27 16:47:12
By: milo
Sources: ex-Intel board member Lip-Bu Tan, an industry veteran, left over what he considered a bloated workforce, risk-averse culture, and lagging AI
0 user ratings
2024-08-27 16:42:09
By: milo
Chinese hackers exploited bug to compromise internet companies, cybersecurity firm says - Yahoo! Voices
0 user ratings
2024-08-27 16:40:57
By: milo
The AI Fix #13: ChatGPT runs for mayor, and should we stop killer robots?
0 user ratings
2024-08-27 16:25:10
By: milo
Microsoft 365 Copilot Vulnerability Exposes User Data Risks
0 user ratings
2024-08-27 16:15:07
By: milo
Full Guide to Hack Pok mon Go for iOS & Android in 2024 - Gizchina.com
0 user ratings
2024-08-27 16:08:53
By: milo
Check Point acquires threat intel company Cyberint
0 user ratings
2024-08-27 15:12:21
By: milo
CISA Adds Four Known Vulnerabilities, 11 ICS Advisories - Manufacturing.net
0 user ratings
2024-08-27 15:02:27
By: milo
This forum has 156 pages of posts.
 
all forums
new post



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.