National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Storm-2561 Uses SEO Poisoning, Fake Signed VPN Apps to Steal Enterprise Credentials
0 user ratings
2026-03-13 11:12:06
By: milo
Iran War Bait Fuels TA453, TA473 Phishing Campaigns
0 user ratings
2026-03-13 09:36:07
By: milo
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
0 user ratings
2026-03-13 09:32:37
By: milo
Apple Releases Emergency iOS 15.8.7 Update to Block Coruna Exploit Kit
0 user ratings
2026-03-13 08:56:07
By: milo
Two Newly Discovered Chrome Zero-Days Exploited in the Wild to Run Malicious Code
0 user ratings
2026-03-13 07:43:06
By: milo
PsExec and Renamed Backup Tools Enabled Data Theft Before INC Ransomware Attack
0 user ratings
2026-03-13 07:43:06
By: milo
Critical CrackArmor Vulnerabilities Expose 12.6 Million Linux Servers to Full Root Takeover
0 user ratings
2026-03-13 06:54:07
By: milo
Six Packagist Packages Linked to Trojanized jQuery Campaign
0 user ratings
2026-03-13 06:46:06
By: milo
New Critical MediaTek Vulnerability Exposes Android Phone PINs to Theft in 45 seconds
0 user ratings
2026-03-13 06:38:08
By: milo
Iran-Linked Handala Ramps Up Wiper Attacks on Israeli, Western Targets
0 user ratings
2026-03-13 05:56:07
By: milo
OpenSSH GSSAPI Flaw Can Be Exploited to Crash SSH Child Processes
0 user ratings
2026-03-13 05:16:07
By: milo
Fileless Remcos RAT Attack Uses JavaScript and PowerShell to Slip Past Detection
0 user ratings
2026-03-13 05:07:07
By: milo
Microsoft Copilot Email and Teams Summarization Flaw Opens Door to Phishing Attacks
0 user ratings
2026-03-13 04:50:09
By: milo
Open Source Intelligence (OSINT): Extracting Information from TikTok
0 user ratings
2026-03-12 21:20:26
By: milo
A US DOJ-led international law enforcement operation disrupted SocksEscort, a residential proxy network used to exploit residential routers worldwide
0 user ratings
2026-03-12 17:09:10
By: milo
Top 5 Security Operations Consulting Firms for Government Contractors
0 user ratings
2026-03-12 16:00:56
By: milo
Introducing Hacktics and Telemetry, a Podcast from Rapid7 Labs
0 user ratings
2026-03-12 13:24:55
By: milo
The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0
0 user ratings
2026-03-12 13:24:54
By: milo
AI-Driven Phishing Attacks Bypass Email Filters, Land in Inboxes
0 user ratings
2026-03-12 13:17:06
By: milo
4,000+ Routers Compromised by KadNap Malware Exploiting Vulnerabilities
0 user ratings
2026-03-12 12:33:11
By: milo
Hackers Exploit Remote Management Tools to Gain Initial Access to Corporate Networks
0 user ratings
2026-03-12 11:33:07
By: milo
New ClickFix Attacks Target macOS Users with MacSync Infostealer
0 user ratings
2026-03-12 11:33:07
By: milo
Hackers Exploit CloudFlare Anti-Security to Steal Microsoft 365 Login Credentials
0 user ratings
2026-03-12 10:32:06
By: milo
Palo Alto Cortex XDR Broker Vulnerability Exposes Systems to Sensitive Information Theft and Modification
0 user ratings
2026-03-12 08:59:06
By: milo
Ericsson US Hit by Cyber Attack, Hackers Steal Personal Data of Employees and Customers
0 user ratings
2026-03-12 08:02:07
By: milo
This forum has 58 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.