National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Knock-off Signal app Mike Waltz was caught using can be hacked in 15 to 20 minutes, report says - Yahoo
0 user ratings
2025-05-22 10:41:03
By: milo
Versa Concerto 0-Day Flaw Enables Remote Code Execution by Bypassing Authentication
0 user ratings
2025-05-22 09:23:18
By: milo
Hackers Targets Coinbase Users Targeted in Advanced Social Engineering Hack
0 user ratings
2025-05-22 08:52:51
By: milo
Hackers Exploit PyBitmessage Library to Evade Antivirus and Network Security Detection
0 user ratings
2025-05-22 08:45:23
By: milo
Cisco Identity Services RADIUS Vulnerability Allows Attackers to Trigger Denial of Service Condition
0 user ratings
2025-05-22 08:37:09
By: milo
Several GitLab Vulnerabilities Enable Attackers to Launch DoS Attacks
0 user ratings
2025-05-22 08:37:08
By: milo
Attackers Exploit BIND DNS Server Vulnerability to Crash Servers Using Malicious Packets
0 user ratings
2025-05-22 08:30:29
By: milo
Grafana Zero-Day Vulnerability Allows Attackers to Redirect Users to Malicious Sites
0 user ratings
2025-05-22 08:30:28
By: milo
New Process Injection Technique Evades EDR by Injecting Malicious Code into Windows Processes
0 user ratings
2025-05-22 08:22:13
By: milo
ThreatBook Recognized as a Notable Vendor in Global Network Analysis and Visibility (NAV) Report
0 user ratings
2025-05-22 05:24:42
By: milo
AI-Powered Malware – The Next Evolution in Cyber Threats
0 user ratings
2025-05-21 23:44:30
By: milo
Understanding Multisig Security for Enhanced Protection of Digital Assets
0 user ratings
2025-05-21 21:32:06
By: milo
More than 60 government officials used knock-off Signal app and a hacker got all their data - The Independent
0 user ratings
2025-05-21 17:37:05
By: milo
Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security
0 user ratings
2025-05-21 17:33:20
By: milo
Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication
0 user ratings
2025-05-21 17:25:13
By: milo
Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees
0 user ratings
2025-05-21 17:17:43
By: milo
PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram
0 user ratings
2025-05-21 16:32:18
By: milo
71 Fake Websites Impersonating German Retailer to Steal Payment Information
0 user ratings
2025-05-21 16:16:20
By: milo
New Scan Uncovers 150K Industrial Systems Worldwide Vulnerable to Cyberattacks
0 user ratings
2025-05-21 15:59:46
By: milo
Windows 11 Introduces Enhanced Administrator Protection to Strengthen Security Against Elevated Privilege Attacks
0 user ratings
2025-05-21 15:52:17
By: milo
Key Takeaways from the Take Command Summit 2025: Inside the Mind of an Attacker
0 user ratings
2025-05-21 14:05:37
By: milo
VanHelsing Ransomware Builder Exposed on Hacker Forums
0 user ratings
2025-05-21 12:37:16
By: milo
PowerDNS Vulnerability Allows Attackers to Trigger DoS Attacks Through Malicious TCP Connections
0 user ratings
2025-05-21 12:37:16
By: milo
19-Year-Old Hacker Admits Guilt in Major Cyberattack on PowerSchool
0 user ratings
2025-05-21 12:23:17
By: milo
IBM Warns: One-Third of Cyber Attacks Use Advanced Tactics to Steal Login Credentials
0 user ratings
2025-05-21 12:23:17
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.