National Cyber Warfare Foundation (NCWF)

Blue Team (CND)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Beyond IoCs: Modernizing Cyber Defense in the CISA 2015 Lapse
0 user ratings
2025-10-20 05:14:16
By: milo
Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel
0 user ratings
2025-10-20 05:01:19
By: milo
ETERNUS SF vulnerable to incorrect default permissions
0 user ratings
2025-10-20 03:03:26
By: milo
MY TAKE: Dispatch from OktoberTech 2025 AI adoption is racing ahead, far outpacing control
0 user ratings
2025-10-19 23:30:09
By: milo
Critical insights Q&A: Anomali s AI-native approach helps defenders cut noise, mitigate swiftly
0 user ratings
2025-10-19 23:30:08
By: milo
Discord confirms vendor breach exposed user IDs in ransom plot - Fox News
0 user ratings
2025-10-19 23:10:51
By: milo
Stay Proactive with Cloud-Native Security
0 user ratings
2025-10-19 22:52:40
By: milo
Are Your Cloud Identities Fully Protected?
0 user ratings
2025-10-19 22:52:40
By: milo
Innovating Identity and Access Management
0 user ratings
2025-10-19 22:52:40
By: milo
China Says It Found Evidence of US Cyber Attack on State Agency - Bloomberg.com
0 user ratings
2025-10-19 16:15:56
By: milo
NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 2025, Paper Session 1
0 user ratings
2025-10-19 15:57:42
By: milo
China says US hacking threatened financial, telecom infrastructure - Pakistan Today
0 user ratings
2025-10-19 15:30:09
By: milo
The Identity Renaissance: Redefining Digital Trust for a New Era
0 user ratings
2025-10-19 15:12:22
By: milo
Security Affairs newsletter Round 546 by Pierluigi Paganini INTERNATIONAL EDITION
0 user ratings
2025-10-19 14:13:31
By: milo
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 67
0 user ratings
2025-10-19 14:13:31
By: milo
What Secure Collaboration Looks Like in Authenticated SaaS Apps?
0 user ratings
2025-10-19 14:00:01
By: milo
China says US hacking threatened financial, telecom infrastructure - The Express Tribune
0 user ratings
2025-10-19 13:13:12
By: milo
The Ghost in the Machine: How Ai Turned Voice into the Ultimate Cyber Weapon
0 user ratings
2025-10-19 13:12:33
By: milo
I tested a $2,000 medical tablet for research, and it turned out to be a Windows beast
0 user ratings
2025-10-19 12:06:32
By: milo
One of Australia's biggest telcos is hit by cybersecurity attack - with some customers' phone numbers HIJACKED - Daily Mail
0 user ratings
2025-10-19 11:21:12
By: milo
The Security-Convenience Tradeoff in Authentication: Are We Finally Solving It?
0 user ratings
2025-10-19 10:24:57
By: milo
Updated to Android 16? You should enable these 2 critical security features ASAP - here's why
0 user ratings
2025-10-19 08:05:20
By: milo
Ensuring a Safe Digital Landscape with NHIDR
0 user ratings
2025-10-19 00:52:10
By: milo
Static vs Dynamic Android App Pentesting: How AutoSecT Combines Both
0 user ratings
2025-10-18 23:55:06
By: milo
NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 25, Keynote Address: NASA’s Core Flight System (cFS) 2.0 An
0 user ratings
2025-10-18 20:53:51
By: milo
This forum has 201 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.