National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Open Directories Exposes Publically Available tools Used by Hackers
0 user ratings
2025-06-21 21:01:48
By: milo
Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports
0 user ratings
2025-06-21 20:05:07
By: milo
Microsoft Announces New Graph Powered Detection of Hybrid Attack Targeting Organizations
0 user ratings
2025-06-21 19:06:11
By: milo
Iranian Hacktivist Attacking Israeli Military, Government, and Infrastructure Targets
0 user ratings
2025-06-21 18:07:18
By: milo
If The US Attacks Iran, Will Iran Attack US Industrial Facilities (SCADA ICS)?
0 user ratings
2025-06-21 15:21:18
By: milo
Hackers Target 700+ ComfyUI AI Image Generation Servers to Spread Malware
0 user ratings
2025-06-20 21:35:11
By: milo
Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System
0 user ratings
2025-06-20 21:08:07
By: milo
Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
0 user ratings
2025-06-20 20:41:24
By: milo
Network Espionage: Using Russian Cameras as Proxies to Hide Your Data
0 user ratings
2025-06-20 20:23:09
By: milo
Beware of Weaponized MSI Installer Masquerading as WhatsApp to Deliver XWorm RAT
0 user ratings
2025-06-20 20:17:20
By: milo
Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware
0 user ratings
2025-06-20 19:43:08
By: milo
Threat Actors Manipulate Google Search Results to Display Scammer’s Phone Number Instead of Real Number
0 user ratings
2025-06-20 19:16:43
By: milo
Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection
0 user ratings
2025-06-20 18:51:21
By: milo
Threat Actors Exploit Vercel Hosting Platform to Distribute Remote Access Malware
0 user ratings
2025-06-20 18:25:17
By: milo
TxTag Phishing Campaign Exploits .gov Domain to Deceive Employees
0 user ratings
2025-06-20 18:00:16
By: milo
PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
0 user ratings
2025-06-20 17:27:21
By: milo
How Artificial Intelligence (AI) Large Language Models (LLMs) Work, Part 1
0 user ratings
2025-06-20 16:27:07
By: milo
Network Espionage: Using Russian Cameras as Proxy
0 user ratings
2025-06-20 14:08:19
By: milo
Massive DDoS Attack Hits 7.3 Tbps Delivering 37.4 Terabytes in 45 Seconds
0 user ratings
2025-06-20 13:22:46
By: milo
Azure Misconfiguration Lets Attackers Take Over Cloud Infrastructure
0 user ratings
2025-06-20 13:07:06
By: milo
AntiDot 3-in-1 Android Botnet Malware Grants Attackers Full Control Over Victim Devices
0 user ratings
2025-06-20 11:56:40
By: milo
GitPhish – OAuth Device Code Phishing for GitHub Repos, Secrets, and CI CD
0 user ratings
2025-06-20 11:52:50
By: milo
Oxford City Council Hit by Cyberattack Exposing Employee Personal Data
0 user ratings
2025-06-20 11:11:07
By: milo
Versa Director Flaws Let Attackers Execute Arbitrary Commands
0 user ratings
2025-06-20 11:02:46
By: milo
GodFather Android Malware Uses On-Device Virtualization to Hijack Legitimate Banking Apps
0 user ratings
2025-06-20 10:41:41
By: milo
This forum has 73 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.