National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
APT Groups Target Construction Firms to Steal RDP, SSH, and Citrix Credentials
0 user ratings
2025-11-10 07:31:09
By: milo
Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
0 user ratings
2025-11-10 07:04:05
By: milo
LangGraph Deserialization Flaw Enables Execution of Malicious Python Code
0 user ratings
2025-11-10 07:04:05
By: milo
Elastic Defend for Windows Vulnerability Allows Threat Actors to Gain Elevated Access
0 user ratings
2025-11-10 06:46:07
By: milo
Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
0 user ratings
2025-11-10 06:36:20
By: milo
Data Leak Exposes Chinese State-Sponsored Cyber Arsenal and Target Database
0 user ratings
2025-11-10 06:19:03
By: milo
Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit
0 user ratings
2025-11-10 06:00:18
By: milo
New Whisper-Based Attack Reveals User Prompts Hidden Inside Encrypted AI Traffic
0 user ratings
2025-11-10 05:43:06
By: milo
Monsta FTP Remote Code Execution Flaw Being Exploited in the Wild
0 user ratings
2025-11-10 04:56:03
By: milo
AI-Powered Cyber Threats Rise: Attackers Target Manufacturing Sector
0 user ratings
2025-11-08 06:43:38
By: milo
New LANDFALL Android Malware Uses Samsung 0-Day Vulnerability Hidden in WhatsApp Images
0 user ratings
2025-11-08 05:40:44
By: milo
New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks
0 user ratings
2025-11-08 05:06:12
By: milo
Balancer makes last appeal to hacker behind $100M+ exploit - TradingView
0 user ratings
2025-11-07 20:23:12
By: milo
SCADA ICS Forensics, Nov. 18-20
0 user ratings
2025-11-07 18:36:32
By: milo
Using Artificial Intelligence (AI) in Cybersecurity: Accelerate Your Python Development with Terminal Integrated AI
0 user ratings
2025-11-07 16:00:10
By: milo
German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure
0 user ratings
2025-11-07 13:39:55
By: milo
Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware
0 user ratings
2025-11-07 13:29:25
By: milo
ClickFix Attack Evolves: Weaponized Videos Trigger Self-Infection Tactics
0 user ratings
2025-11-07 13:01:21
By: milo
Herodotus Android Banking Trojan Takes Over Devices, Outsmarts Security Tools
0 user ratings
2025-11-07 12:31:17
By: milo
New Analysis Reveals LockBit 5.0 s Core Features and Dual-Stage Attack Model
0 user ratings
2025-11-07 12:02:53
By: milo
U.S. Congressional Budget Office Hit by Cyberattack, Sensitive Data Compromised
0 user ratings
2025-11-07 12:02:53
By: milo
Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain
0 user ratings
2025-11-07 11:15:55
By: milo
New Android Malware Fantasy Hub Spies on Users Calls, Contacts, and Messages
0 user ratings
2025-11-07 11:15:54
By: milo
Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware
0 user ratings
2025-11-07 09:45:49
By: milo
Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets
0 user ratings
2025-11-07 09:27:08
By: milo
This forum has 62 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.