National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Russian Hackers Exploit XSS Vulnerabilities to Inject Malicious Code into Email Servers
0 user ratings
2025-05-15 13:20:46
By: milo
Windows Defender Application Control Bypassed Through Browser Exploit Techniques
0 user ratings
2025-05-15 13:14:18
By: milo
Weaponized Google Calendar Invites Deliver Malicious Payload Using a Single Character
0 user ratings
2025-05-15 13:14:18
By: milo
U.S. Officials Probe Rogue Communication Devices in Solar Power Inverters
0 user ratings
2025-05-15 13:08:06
By: milo
TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems
0 user ratings
2025-05-15 12:59:44
By: milo
DarkCloud Stealer Employs AutoIt to Evade Detection and Steal Login Credentials
0 user ratings
2025-05-15 12:44:45
By: milo
Chihuahua Stealer Exploits Google Drive Document to Harvest Browser Login Credentials
0 user ratings
2025-05-15 12:31:05
By: milo
Spies hack high-value mail servers using an exploit from yesteryear - Ars Technica
0 user ratings
2025-05-15 12:26:55
By: milo
Interlock Ransomware Targeting Defense Contractors and Supply Chain Networks
0 user ratings
2025-05-15 12:23:40
By: milo
Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled
0 user ratings
2025-05-15 07:47:42
By: milo
Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild
0 user ratings
2025-05-15 06:32:41
By: milo
Fix Toyota Touch Screen Issues: Blank, Frozen, or Unresponsive Display
0 user ratings
2025-05-15 04:41:17
By: milo
Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware
0 user ratings
2025-05-14 15:20:49
By: milo
TA406 Hackers Target Government Entities to Steal Login Credentials
0 user ratings
2025-05-14 15:20:49
By: milo
Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files
0 user ratings
2025-05-14 15:13:13
By: milo
CVE-2025-32756 Exploited in the Wild, Affecting Multiple Fortinet Products
0 user ratings
2025-05-14 15:03:04
By: milo
Severe Adobe Illustrator Flaw Allows Remote Code Execution
0 user ratings
2025-05-14 14:58:22
By: milo
New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution
0 user ratings
2025-05-14 14:58:21
By: milo
Researchers Unveil New Mechanism to Track Compartmentalized Cyber Threats
0 user ratings
2025-05-14 14:23:41
By: milo
New HTTPBot Botnet Rapidly Expands to Target Windows Machines
0 user ratings
2025-05-14 14:08:51
By: milo
Katz Stealer Malware Hits 78+ Chromium and Gecko-Based Browsers
0 user ratings
2025-05-14 13:41:19
By: milo
Critical Vulnerability in Windows Remote Desktop Gateway Allows Denial-of-Service Attacks
0 user ratings
2025-05-14 13:41:19
By: milo
Critical Microsoft Outlook Flaw Enables Remote Execution of Arbitrary Code
0 user ratings
2025-05-14 13:32:48
By: milo
Microsoft Defender Vulnerability Allows Unauthorized Privilege Gain
0 user ratings
2025-05-14 13:25:25
By: milo
Healthcare Cyberattacks in 2024 Expose 276 Million Patient Records Compromised
0 user ratings
2025-05-14 13:18:10
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.