National Cyber Warfare Foundation (NCWF) Forums


Blue Team (CND)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
What is SOC 2 Compliance Audit?
0 user ratings
2024-04-19 10:12:31
By: milo
FBI chief says China is preparing to attack US critical infrastructure
0 user ratings
2024-04-19 09:31:15
By: milo
The Dark Side of EDR: Repurpose EDR as an Offensive Tool
0 user ratings
2024-04-19 08:40:14
By: milo
Google Chrome DBSC Protection Tested Against Cookie Attacks
0 user ratings
2024-04-19 08:40:13
By: milo
Crunching Some Numbers on PHP Support
0 user ratings
2024-04-19 08:40:13
By: milo
A look at Salad, which pays gamers in Fortnite skins and Roblox gift cards to rent their GPUs remotely to AI companies, including those making AI-gene
0 user ratings
2024-04-19 08:31:07
By: milo
The Ultimate Guide to SBIR and STTR Program Budgeting
0 user ratings
2024-04-19 07:42:14
By: milo
United Nations Development Programme (UNDP) investigates data breach
0 user ratings
2024-04-19 07:28:07
By: milo
Sophos researchers find "crude", cheap ransomware tools being sold on the dark web, enabling inexperienced freelancers to easily launch atta
0 user ratings
2024-04-19 05:26:34
By: milo
CISA Tells Feds to Mitigate Microsoft Midnight Blizzard - MSSP Alert
0 user ratings
2024-04-19 04:03:57
By: milo
LINE client for iOS vulnerable to improper server certificate verification
0 user ratings
2024-04-19 04:02:04
By: milo
Armeria-saml improperly handles SAML messages
0 user ratings
2024-04-19 04:02:04
By: milo
Internal draft: UK's ICO says Google's Privacy Sandbox falls short and leaves gaps that can be exploited to undermine privacy of users who s
0 user ratings
2024-04-19 03:58:10
By: milo
Wray: Chinese Government Poses 'Bold and Unrelenting' Threat to U.S. Critical Infrastructure Federal Bureau of ... - Federal Bureau of Investigation
0 user ratings
2024-04-19 02:50:12
By: milo
Microsoft researchers introduce VASA-1, an AI model that creates a realistic talking face video from a portrait photo and an audio file, in research p
0 user ratings
2024-04-19 01:02:40
By: milo
To Breach or Not to Breach
0 user ratings
2024-04-18 23:14:15
By: milo
What Makes Containers Vulnerable?
0 user ratings
2024-04-18 23:14:14
By: milo
Google says it will consolidate teams that focus on building AI models across Research and DeepMind, and move its Responsible AI teams in Research to
0 user ratings
2024-04-18 22:12:21
By: milo
Europol-led task force shuts down LabHost phishing platform, arrests suspected hackers - SiliconANGLE News
0 user ratings
2024-04-18 22:11:35
By: milo
Vulnerabilities for AI and ML Applications are Skyrocketing
0 user ratings
2024-04-18 21:10:11
By: milo
USENIX Security 23 – Fourteen Years in the Life: A Root Server s Perspective on DNS Resolver Security
0 user ratings
2024-04-18 20:40:06
By: milo
CIS Compliance Best Practices and Advice
0 user ratings
2024-04-18 20:40:06
By: milo
Short-form video app Triller is merging with Hong Kong financial services company AGBA; Triller shareholders will own 80% of the combined company valu
0 user ratings
2024-04-18 19:18:57
By: milo
DAST is dead, why Business Logic Security Testing takes center stage
0 user ratings
2024-04-18 19:13:19
By: milo
Fixing a $12bn Challenge for Banks Through Data-Centric Security
0 user ratings
2024-04-18 19:13:18
By: milo
This forum has 166 pages of posts.
 
all forums
new post



© Copyright 2012 through 2024 - National Cyber War Foundation - All rights reserved worldwide.