National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass
0 user ratings
2025-08-15 09:03:07
By: milo
Source Code of ERMAC V3.0 Malware Exposed by changemeplease Password
0 user ratings
2025-08-15 08:54:17
By: milo
10 Best Managed Detection And Response (MDR) Companies in 2025
0 user ratings
2025-08-15 08:06:08
By: milo
Cisco Secure Firewall Snort 3 Vulnerability Enable DoS Attacks
0 user ratings
2025-08-15 07:16:23
By: milo
HTTP 2 MadeYouReset Vulnerability Enables Massive DDoS Attacks
0 user ratings
2025-08-15 06:09:21
By: milo
Cisco Secure Firewall Vulnerability Lets Attackers Execute Remote Shell Commands
0 user ratings
2025-08-15 05:14:02
By: milo
MailSniper – PowerShell Tool for Exchange Mailbox Search and Credential Discovery
0 user ratings
2025-08-15 02:03:10
By: milo
Ransomware Actors Combine Legitimate Tools with Custom Malware to Evade Detection
0 user ratings
2025-08-14 22:23:07
By: milo
Threat Actors Leverage CrossC2 to Extend Cobalt Strike to Linux and macOS
0 user ratings
2025-08-14 19:25:17
By: milo
PS1Bot: Multi-Stage Malware Framework Targeting Windows Systems
0 user ratings
2025-08-14 18:35:07
By: milo
New NFC-Based PhantomCard Malware Targets Android Banking Users
0 user ratings
2025-08-14 17:19:18
By: milo
Threat Actors Use Advanced Tactics to Personalize Phishing for Malware Delivery
0 user ratings
2025-08-14 16:31:14
By: milo
Google Mandates License or Certification for Crypto App Developers
0 user ratings
2025-08-14 16:22:25
By: milo
Hackers Exploit Microsoft Flaw to Breach Canadian House of Commons to Gain Unauthorized Access
0 user ratings
2025-08-14 16:07:04
By: milo
Qilin Ransomware Dominates July with Over 70 Claimed Victims
0 user ratings
2025-08-14 15:26:12
By: milo
CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders
0 user ratings
2025-08-14 12:29:23
By: milo
Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution
0 user ratings
2025-08-14 12:13:04
By: milo
Ether rally turns Radiant Capital exploit into $103M windfall for hacker - Cointelegraph
0 user ratings
2025-08-14 12:00:06
By: milo
FireWood Malware Targets Linux Systems for Command Execution and Data Theft
0 user ratings
2025-08-14 11:39:13
By: milo
EncryptHub Turns Brave Support Into a Dropper; MMC Flaw Completes the Run
0 user ratings
2025-08-14 10:41:20
By: milo
Splunk Publishes Defender s Guide to Spot ESXi Ransomware Early
0 user ratings
2025-08-14 10:41:19
By: milo
Windows Out-of-Box-Experience Flaw Enables Full Administrative Command Prompt Access
0 user ratings
2025-08-14 10:16:15
By: milo
‘AI Induced Destruction’ – How AI Misuse is Creating New Attack Vectors
0 user ratings
2025-08-14 10:08:05
By: milo
Attackers Need Just One Vulnerability to Own Your Rooted Android
0 user ratings
2025-08-14 09:33:18
By: milo
Proxyware Campaign Piggybacks on Popular YouTube Video Download Services
0 user ratings
2025-08-14 07:19:07
By: milo
This forum has 63 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.