National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation
0 user ratings
2025-06-16 18:07:19
By: milo
Windows Privilege Escalation with Russian Software
0 user ratings
2025-06-16 17:39:14
By: milo
Young Canadians are being recruited and exploited by The Com hacking community - CTV News
0 user ratings
2025-06-16 15:17:10
By: milo
Hackers Target and Hijack Washington Post Journalists Email Accounts
0 user ratings
2025-06-16 13:55:13
By: milo
Zoomcar Data Breach Exposes Sensitive Details of 8.4 Million Users
0 user ratings
2025-06-16 12:49:10
By: milo
Operation Deep Sentinel: Authorities Shut Down Darknet Market Archetyp
0 user ratings
2025-06-16 12:41:26
By: milo
Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
0 user ratings
2025-06-16 12:33:14
By: milo
BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files
0 user ratings
2025-06-16 12:33:14
By: milo
Threat Actors Deploy XWorm Malware via Fake Travel Websites to Infect Users PCs
0 user ratings
2025-06-16 12:10:10
By: milo
North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials
0 user ratings
2025-06-16 11:39:21
By: milo
Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
0 user ratings
2025-06-16 10:50:12
By: milo
GrayAlpha Hackers Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
0 user ratings
2025-06-16 10:16:22
By: milo
Over 20 Malicious Google Play Apps Steal Users Login Credentials
0 user ratings
2025-06-16 10:00:06
By: milo
Anubis Ransomware Introduces Irreversible File Destruction Feature
0 user ratings
2025-06-16 09:51:21
By: milo
Microsoft Purview DLP Now Controls Copilot s Access to Sensitive Email Data
0 user ratings
2025-06-16 09:51:21
By: milo
Uncovering the Technique of Hiding Images in DNS TXT Entries
0 user ratings
2025-06-16 07:32:06
By: milo
Google Cloud Suffers Major Disruption After API Management Error
0 user ratings
2025-06-16 06:56:21
By: milo
IBM Backup Services Flaw Allows Hackers to Gain Elevated Access
0 user ratings
2025-06-16 06:47:06
By: milo
KIA Ecuador Keyless Entry Systems Vulnerability Faces Major Theft Threat
0 user ratings
2025-06-16 06:38:20
By: milo
claws GitHub Actions Workflow Linter for Secure CI CD Pipelines
0 user ratings
2025-06-16 02:10:11
By: milo
A very toxic culture : Hacking gangs recruiting and exploiting young Canadians - CP24
0 user ratings
2025-06-15 09:30:38
By: milo
A very toxic culture : Hacking gangs recruiting and exploiting young Canadians - CTV News
0 user ratings
2025-06-15 09:07:34
By: milo
Logic Basics for Cybersecurity: One of the Most Under-Rated Skills in Cybersecurity
0 user ratings
2025-06-14 18:50:16
By: milo
Logic in Cybersecurity: One of the Most Under-Rated Skills in Cybersecurity
0 user ratings
2025-06-14 17:20:57
By: milo
Windows Network Exploitation with Impacket Framework
0 user ratings
2025-06-14 14:58:58
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.