National Cyber Warfare Foundation (NCWF)

Blue Team (CND)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13 17.2.1
0 user ratings
2026-03-04 14:13:28
By: milo
Live blog: Every new Apple product and updates from the March event
0 user ratings
2026-03-04 14:09:12
By: milo
How to Identify a Phishing Website
0 user ratings
2026-03-04 14:03:45
By: milo
Crowdstrike 2026 Global Threat Report: 3 Key Learnings for Identity Security
0 user ratings
2026-03-04 14:03:43
By: milo
High-severity Qualcomm bug hits Android devices in targeted attacks
0 user ratings
2026-03-04 13:39:41
By: milo
Attackers abuse OAuth s built-in redirects to launch phishing and malware attacks
0 user ratings
2026-03-04 13:39:40
By: milo
Perplexity signs a multiyear deal with CoreWeave to use dedicated clusters powered by Nvidia Grace Blackwell chips for AI inference; CRWV jumps 5%+ pr
0 user ratings
2026-03-04 13:22:13
By: milo
Cyber Defense Magazine | A New Bell Rings For K-12 Cloud Security After the Illuminate Settlement
0 user ratings
2026-03-04 12:43:40
By: milo
From phishing to Google Drive C2: Silver Dragon expands APT41 playbook
0 user ratings
2026-03-04 12:39:50
By: milo
Kraken says its banking unit won "master account" access to the US Fed's core payment systems, the first crypto company to be able to m
0 user ratings
2026-03-04 12:32:12
By: milo
State-developed iPhone hacking tools reused by cybercriminals, Google warns - The Daily Star
0 user ratings
2026-03-04 12:07:13
By: milo
How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers
0 user ratings
2026-03-04 12:01:37
By: milo
3 pillars of hyperproductivity for MSPs
0 user ratings
2026-03-04 11:44:40
By: milo
Coruna Exploit Kit With 23 Exploits Hacked Thousands of iPhones - CybersecurityNews
0 user ratings
2026-03-04 10:53:14
By: milo
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows
0 user ratings
2026-03-04 10:47:27
By: milo
Shadow AI vs Managed AI: What s the Difference? – FireTail Blog
0 user ratings
2026-03-04 10:38:40
By: milo
Telegram Increasingly Used to Sell Access, Malware and Stolen Logs
0 user ratings
2026-03-04 10:22:22
By: milo
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
0 user ratings
2026-03-04 09:57:29
By: milo
U.S. CISA adds Qualcomm and Broadcom VMware Aria Operations flaws to its Known Exploited Vulnerabilities catalog
0 user ratings
2026-03-04 09:33:50
By: milo
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
0 user ratings
2026-03-04 08:58:24
By: milo
Data breach at University of Hawai i Cancer Center impacts 1.2 Million individuals
0 user ratings
2026-03-04 08:35:50
By: milo
Secure Authentication Architecture for Ecommerce and Retail Platforms
0 user ratings
2026-03-04 08:14:39
By: milo
An iPhone hacking toolkit with suspected government ties just showed up in criminal hands - Phandroid
0 user ratings
2026-03-04 07:08:13
By: milo
The Worm Turns When the Hunter Becomes the Hunted Mass Surveillance and the Weaponization of the Data We Voluntarily Create
0 user ratings
2026-03-04 07:01:37
By: milo
Would You Trust an AI Pentester to Work Solo?
0 user ratings
2026-03-04 06:09:49
By: milo
This forum has 495 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.