National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week
0 user ratings
2025-05-12 14:35:55
By: milo
PupkinStealer .NET Malware Steals Browser Data and Exfiltrates via Telegram
0 user ratings
2025-05-12 14:28:43
By: milo
Recognizing Excellence: Rapid7 s Kelly Hiscoe and Heather DeMartini Honored as CRN s 2025 Women of the Channel
0 user ratings
2025-05-12 14:23:28
By: milo
Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection
0 user ratings
2025-05-12 14:21:06
By: milo
Recognizing Excellence: Rapid7 s Kelly Hiscoe and Heather DiMartini Honored as CRN s 2025 Women of the Channel
0 user ratings
2025-05-12 14:09:32
By: milo
VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations
0 user ratings
2025-05-12 12:33:51
By: milo
SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths
0 user ratings
2025-05-12 11:20:10
By: milo
Metasploit Update Adds Erlang OTP SSH Exploit and OPNSense Scanner
0 user ratings
2025-05-12 09:58:49
By: milo
Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
0 user ratings
2025-05-12 08:54:06
By: milo
Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access
0 user ratings
2025-05-12 08:24:45
By: milo
Cybercriminals Hide Undetectable Ransomware Inside JPG Images
0 user ratings
2025-05-12 08:24:45
By: milo
Defendnot: A Tool That Disables Windows Defender by Registering as Antivirus
0 user ratings
2025-05-12 08:01:18
By: milo
Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data
0 user ratings
2025-05-12 08:01:17
By: milo
Mitel SIP Phone Flaws Allow Attackers to Inject Malicious Commands
0 user ratings
2025-05-12 07:40:13
By: milo
Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
0 user ratings
2025-05-12 06:40:10
By: milo
New Exploit Method Extracts Microsoft Entra Tokens Through Beacon
0 user ratings
2025-05-12 05:42:58
By: milo
PoC Code Published for Linux nftables Security Vulnerability
0 user ratings
2025-05-12 05:19:45
By: milo
Sophisticated PhaaS Phish Toolkits are Now Genetrating Realistic Fake Phishing Pages
0 user ratings
2025-05-10 17:26:18
By: milo
Critical Azure and Power Apps Vulnerabilities Allow Attackers to Exploit RCE
0 user ratings
2025-05-10 16:51:19
By: milo
How to Detecting Backdoors in Enterprise Networks
0 user ratings
2025-05-10 16:21:12
By: milo
Bluetooth Core 6.1 Released – What’s New!
0 user ratings
2025-05-10 15:51:20
By: milo
Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide
0 user ratings
2025-05-10 15:51:20
By: milo
Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams
0 user ratings
2025-05-10 15:16:21
By: milo
DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs
0 user ratings
2025-05-10 14:47:47
By: milo
Why CISOs Must Prioritize Cybersecurity Culture in Remote Work
0 user ratings
2025-05-10 14:25:40
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.