National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
0 user ratings
2025-06-17 17:59:05
By: milo
Beware: Weaponized Research Papers Delivering Malware Through Password-Protected Documents
0 user ratings
2025-06-17 17:34:17
By: milo
Kimsuky and Konni APT Groups Lead Active Attacks Targeting East Asia
0 user ratings
2025-06-17 17:08:14
By: milo
XDSpy Threat Actors Exploit Windows LNK Zero-Day Vulnerability to Target Windows System Users
0 user ratings
2025-06-17 16:36:05
By: milo
VPN Hacking: Authentication Bypass on Fortinet Fortios
0 user ratings
2025-06-17 16:01:11
By: milo
BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code
0 user ratings
2025-06-17 13:21:15
By: milo
Critical Vulnerabilities in Sitecore Could Lead to Widespread Enterprise Attacks
0 user ratings
2025-06-17 13:04:19
By: milo
Hackers Manipulate Search Engines to Push Malicious Sites
0 user ratings
2025-06-17 12:14:12
By: milo
WhatsApp s Status Tab Set to Feature Ads as Meta Monetizes Platform
0 user ratings
2025-06-17 11:26:05
By: milo
Hackers Use Fake Verification Prompt and Clickfix Technique to Deploy Fileless AsyncRAT
0 user ratings
2025-06-17 11:17:19
By: milo
ASUS Armoury Crate Vulnerability Lets Hackers Gain System-Level Access on Windows
0 user ratings
2025-06-17 10:44:06
By: milo
Critical sslh Vulnerabilities Allow Remote Denial-of-Service Attacks
0 user ratings
2025-06-17 10:18:20
By: milo
Water Curse Hacker Group Uses 76 GitHub Accounts to Spread Multistage Malware
0 user ratings
2025-06-17 10:18:20
By: milo
150K+ Users Affected by Malicious Loan Apps on iOS and Google Play
0 user ratings
2025-06-17 09:04:12
By: milo
Hackers Exploiting Chrome Zero Day Vulnerability in the Wild
0 user ratings
2025-06-17 08:48:16
By: milo
Android Devices Under Siege: How Threat Actors Abuse OEM Permissions for Privilege Escalation
0 user ratings
2025-06-17 07:58:09
By: milo
CISA Alerts: iOS Zero Click Flaw Actively Exploited
0 user ratings
2025-06-17 07:41:13
By: milo
GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
0 user ratings
2025-06-17 07:00:16
By: milo
DeerStealer Malware Deployed Through Exploitation of Windows Run Prompt by Threat Actors
0 user ratings
2025-06-17 06:45:15
By: milo
Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks
0 user ratings
2025-06-17 06:05:20
By: milo
Hackers Weaponize Langflow Vulnerability to Launch Flodrix Botnet
0 user ratings
2025-06-17 05:49:20
By: milo
Zyxel Devices Under Attack as Hackers Exploit UDP Port RCE Flaw
0 user ratings
2025-06-17 05:17:12
By: milo
Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms
0 user ratings
2025-06-16 18:59:10
By: milo
Washington Post Hacked – Multiple Journalists Email Accounts Compromised
0 user ratings
2025-06-16 18:42:13
By: milo
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS Tokens and Sensitive Data
0 user ratings
2025-06-16 18:33:05
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.