National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Darknet Communications in 2025 – From IRC Forums to Telegram Crime Networks
0 user ratings
2025-08-20 01:36:20
By: milo
47,000 Individuals Affected by Data Breach, Reveals NY Business Council
0 user ratings
2025-08-19 20:38:48
By: milo
New Research Exposes DPRK IT Workers’ Email Addresses and Recruitment Trends
0 user ratings
2025-08-19 19:37:52
By: milo
New Research Reveals Security Vulnerabilities Linked to Popular VPN Apps
0 user ratings
2025-08-19 18:35:10
By: milo
Mobile Phishers Target Brokerage Customers in ‘Ramp and Dump’ Cashout Scheme
0 user ratings
2025-08-19 17:33:18
By: milo
New ClickFix Attack Deploys Fake BBC News Page and Fake Cloudflare Verification to Deceive Users
0 user ratings
2025-08-19 16:29:43
By: milo
Workday hit by hack of third-party CRM app via social engineering - SC Media
0 user ratings
2025-08-19 15:43:18
By: milo
Weaponized Copyright Documents Used by Threat Actors to Target Key Employees with Noodlophile Stealer
0 user ratings
2025-08-19 15:39:11
By: milo
Surge in Scans From Hacked Cisco, Linksys, and Araknis Routers
0 user ratings
2025-08-19 13:04:16
By: milo
SAP 0-Day Exploit Reportedly Leaked by ShinyHunters Hackers
0 user ratings
2025-08-19 12:26:54
By: milo
New Android Attack Targets Indian Users with Free Electricity Subsidy to Install Malware
0 user ratings
2025-08-19 12:09:05
By: milo
North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware
0 user ratings
2025-08-19 11:15:45
By: milo
Microsoft Defender AI Can Detect Plaintext Credentials in Active Directory
0 user ratings
2025-08-19 10:27:14
By: milo
PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks
0 user ratings
2025-08-19 10:10:20
By: milo
PyPI Moves to Stop Domain Resurrection Attacks with Expired Domain Blocks
0 user ratings
2025-08-19 10:01:17
By: milo
Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process
0 user ratings
2025-08-19 08:27:52
By: milo
PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware
0 user ratings
2025-08-19 07:20:47
By: milo
Malicious npm Packages Target Crypto Developers to Steal Login Credentials
0 user ratings
2025-08-19 07:20:47
By: milo
New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads
0 user ratings
2025-08-19 07:12:13
By: milo
CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability
0 user ratings
2025-08-19 06:47:07
By: milo
Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters
0 user ratings
2025-08-19 05:55:47
By: milo
Intel Websites Compromised, Allowing Hackers Access to Employee and Confidential Data
0 user ratings
2025-08-19 05:05:16
By: milo
Hacking, ransom, lawsuits: Why social engineering is TCS, Cognizant s latest headache - The Economic Times
0 user ratings
2025-08-18 22:40:11
By: milo
Dutch speed cameras still disrupted following prosecution service hack - SC Media
0 user ratings
2025-08-18 21:28:05
By: milo
Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers
0 user ratings
2025-08-18 21:13:10
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.