National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
After Grok's "white genocide in South Africa" X replies, xAI says "an unauthorized modification was made to Grok response bot&apos
0 user ratings
2025-05-16 12:27:38
By: milo
FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
0 user ratings
2025-05-16 11:28:14
By: milo
Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
0 user ratings
2025-05-16 11:21:04
By: milo
APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
0 user ratings
2025-05-16 11:12:21
By: milo
Ivanti Endpoint Manager Mobile exploit chain exploited in the wild
0 user ratings
2025-05-16 11:09:25
By: milo
SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign
0 user ratings
2025-05-16 10:56:20
By: milo
Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution
0 user ratings
2025-05-16 10:56:20
By: milo
Jenkins Released Security Updates Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI CD Pipelines
0 user ratings
2025-05-16 10:18:20
By: milo
Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked
0 user ratings
2025-05-16 09:11:12
By: milo
SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access
0 user ratings
2025-05-16 08:55:11
By: milo
Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants
0 user ratings
2025-05-16 08:55:11
By: milo
Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses
0 user ratings
2025-05-16 08:17:10
By: milo
Researchers Replicate Advanced Tactics and Tools of VanHelsing Ransomware
0 user ratings
2025-05-16 08:02:18
By: milo
Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion
0 user ratings
2025-05-16 06:27:36
By: milo
Tor Oniux Tool Offers Anonymous Linux App Traffic
0 user ratings
2025-05-16 06:19:13
By: milo
Following Grok's "white genocide in South Africa" responses on X, xAI says an "unauthorized modification" was made to the Gro
0 user ratings
2025-05-16 02:07:36
By: milo
Wazuh Open Source Security Platform for Threat Detection, Visibility & Compliance
0 user ratings
2025-05-16 01:10:50
By: milo
Government webmail hacked via XSS bugs in global spy campaign - BleepingComputer
0 user ratings
2025-05-15 20:18:59
By: milo
Coinbase Data Breach – Customers Personal Info, Government ID & Transaction Data Exposed
0 user ratings
2025-05-15 17:33:14
By: milo
Inside Turla s Uroboros Infrastructure and Tactics Revealed
0 user ratings
2025-05-15 16:43:22
By: milo
Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions
0 user ratings
2025-05-15 16:28:46
By: milo
Hackers Exploit Google Services to Send Malicious Law Enforcement Requests
0 user ratings
2025-05-15 16:28:46
By: milo
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
0 user ratings
2025-05-15 16:28:45
By: milo
CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
0 user ratings
2025-05-15 16:21:19
By: milo
Record-Breaking $27 Billion Black Market Haowang Guarantee Deals Conducted Behind Closed Doors
0 user ratings
2025-05-15 16:21:19
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.