National Cyber Warfare Foundation (NCWF)

Blue Team (CND)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
The Role of SLDC Gap Analysis in Reducing Development Risks
0 user ratings
2025-11-08 19:27:28
By: milo
China-linked hackers target U.S. non-profit in long-term espionage campaign
0 user ratings
2025-11-08 19:23:05
By: milo
A new Italian citizen was targeted with Paragon s Graphite spyware. We have a serious problem
0 user ratings
2025-11-08 17:30:40
By: milo
NDSS 2025 – Qualitative Study On Boards’ Cybersecurity Risk Decision Making
0 user ratings
2025-11-08 16:29:57
By: milo
Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware - The Hacker News
0 user ratings
2025-11-08 16:20:59
By: milo
How FedRAMP Agencies Evaluate CSP SAR Submissions
0 user ratings
2025-11-08 14:54:48
By: milo
Balancer hack analysis and guidance for the DeFi ecosystem
0 user ratings
2025-11-08 11:28:04
By: milo
Warning! Don t open these WhatsApp images, else you ll get hacked - PCWorld
0 user ratings
2025-11-08 08:26:17
By: milo
An account of working at Cursor for 60 days: a largely in-person culture, few scheduled meetings, aggressive recruiting, heavy internal product testin
0 user ratings
2025-11-08 07:37:59
By: milo
In DeepSeek's first public appearance since R1's success, a senior researcher told a state-run conference he was pessimistic about AI's
0 user ratings
2025-11-08 06:36:11
By: milo
Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware
0 user ratings
2025-11-08 05:42:29
By: milo
In memoriam: David Harley
0 user ratings
2025-11-08 02:46:45
By: milo
How MSSPs Turn Security Alerts Into Exponential Revenue With Morpheus AI
0 user ratings
2025-11-08 02:26:07
By: milo
Google introduces Nested Learning, a new ML approach for continual learning that views models as nested optimization problems to enhance long context
0 user ratings
2025-11-08 02:14:03
By: milo
LLM08: Vector & Embedding Weaknesses – FireTail Blog
0 user ratings
2025-11-08 00:20:55
By: milo
Satisfied with Your Cloud Security? Enhance with NHIs
0 user ratings
2025-11-07 23:27:47
By: milo
Freedom in Cybersecurity: Choosing the Right NHIs
0 user ratings
2025-11-07 23:27:47
By: milo
Achieving Liberating Flexibility with Cloud NHIs
0 user ratings
2025-11-07 23:27:46
By: milo
Newly identified Android spyware appears to be from a commercial vendor - The Record from Recorded Future News
0 user ratings
2025-11-07 22:55:04
By: milo
The Government Shutdown Is a Ticking Cybersecurity Time Bomb
0 user ratings
2025-11-07 22:45:05
By: milo
EasyDMARC Launches Touchpoint A Lead Generation Tool Designed for MSPs
0 user ratings
2025-11-07 22:25:51
By: milo
LANDFALL spyware exploited Samsung zero-day CVE-2025-21042 in Middle East attacks
0 user ratings
2025-11-07 22:24:13
By: milo
In a letter on October 27, OpenAI asked the Trump administration to expand a 35% Chips Act tax credit to help lower the cost of AI infrastructure (Blo
0 user ratings
2025-11-07 21:36:59
By: milo
Both Baumol effect and Jevons paradox may apply to the AI supercycle, as services with AI productivity gains get cheaper, while those without AI becom
0 user ratings
2025-11-07 21:19:15
By: milo
Log4j Vulnerability Guide: Detection and Remediation | Contrast
0 user ratings
2025-11-07 20:55:50
By: milo
This forum has 199 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.