National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Linux 6.16 Released with Performance and Networking Enhancements
0 user ratings
2025-07-29 09:13:16
By: milo
Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web
0 user ratings
2025-07-29 09:13:16
By: milo
New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC
0 user ratings
2025-07-29 09:04:06
By: milo
Hackers Exploit IIS Servers with New Web Shell Script for Full Remote Control
0 user ratings
2025-07-29 08:26:08
By: milo
Threat Actors Use Phishing to Target Belgian Grand Prix Fans and Teams
0 user ratings
2025-07-29 08:03:07
By: milo
GitHub Outage Hits Users Globally, Core Services Unavailable
0 user ratings
2025-07-29 06:41:09
By: milo
CISA Issues Alert on PaperCut RCE Vulnerability Under Active Exploitation
0 user ratings
2025-07-29 06:41:09
By: milo
PoC Exploit Published for Actively Exploited Cisco Identity Services Engine Flaw
0 user ratings
2025-07-29 06:23:13
By: milo
CISA Issues Alert on Cisco Identity Services Engine Flaw Exploited in Active Attacks
0 user ratings
2025-07-29 06:14:26
By: milo
Aeroflot Hit by Year Long Cyber Operation That Allegedly Wiped 7,000 Servers
0 user ratings
2025-07-29 05:01:13
By: milo
UNC3886 Exploits Multiple 0-Day Bugs in VMware vCenter, ESXi, and Fortinet FortiOS
0 user ratings
2025-07-29 04:52:47
By: milo
ArmouryLoader Bypasses Security Protections to Inject Malicious Code
0 user ratings
2025-07-28 19:36:16
By: milo
ToolShell: Uncovering Five Critical Vulnerabilities in Microsoft SharePoint
0 user ratings
2025-07-28 19:12:11
By: milo
Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
0 user ratings
2025-07-28 18:47:07
By: milo
This new Wyze lamp socket is the outdoor smart home upgrade I've been waiting for
0 user ratings
2025-07-28 18:16:29
By: milo
Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems
0 user ratings
2025-07-28 18:14:16
By: milo
UNC3886 Hackers Target Singapore s Critical Infrastructure by Exploiting 0-Day Vulnerabilities
0 user ratings
2025-07-28 17:32:23
By: milo
Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info
0 user ratings
2025-07-28 17:09:14
By: milo
Argus – Ultimate Reconnaissance Toolkit for Offensive Recon Operations
0 user ratings
2025-07-28 16:17:30
By: milo
Taking Over a Russian Domain using Techniques from Digital Forensics
0 user ratings
2025-07-28 14:20:09
By: milo
LLM Honeypots Deceive Hackers into Exposing Attack Methods
0 user ratings
2025-07-28 13:59:13
By: milo
10 Best Ethical Hacking Service Providers in 2025
0 user ratings
2025-07-28 13:11:22
By: milo
NPM ‘is’ Package with 2.8M Weekly Downloads Exploited in Attack on Developers
0 user ratings
2025-07-28 13:11:21
By: milo
Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
0 user ratings
2025-07-28 12:47:16
By: milo
Atomic macOS Stealer Upgraded with Remote Access Backdoor
0 user ratings
2025-07-28 12:15:05
By: milo
This forum has 70 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.