National Cyber Warfare Foundation (NCWF) Forums


Blue Team (CND)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25
0 user ratings
2024-10-23 00:43:05
By: milo
Is an AI-augmented SOC The Way Forward?
0 user ratings
2024-10-22 23:38:21
By: milo
DEF CON 32 – AppSec Village – Lessons Learned from Building and Defending LLM Applications
0 user ratings
2024-10-22 22:45:06
By: milo
USENIX NSDI ’24 – Accelerating Skewed Workloads With Performance Multipliers in the TurboDB Distributed Database
0 user ratings
2024-10-22 22:45:06
By: milo
USENIX NSDI ’24 – SIEVE is Simpler than LRU: An Efficient Turn-Key Eviction Algorithm for Web Caches
0 user ratings
2024-10-22 22:45:05
By: milo
How Security Automation Platforms Streamline SOC Operations
0 user ratings
2024-10-22 22:45:05
By: milo
Finally, an iPhone MagSafe car mount that charges fast while keeping things cool
0 user ratings
2024-10-22 21:53:19
By: milo
The Power of Taint Analysis: Uncovering Critical Code Vulnerability in OpenAPI Generator
0 user ratings
2024-10-22 21:13:35
By: milo
Elevating SaaS Security: The Strategic Role of Bug Bounty Programs
0 user ratings
2024-10-22 19:42:26
By: milo
Trend Micro ZDI Hosts Hacking Contest for Vulnerabilities in AI-Enabled Devices - WV News
0 user ratings
2024-10-22 19:09:15
By: milo
Android Auto is getting a free gen AI upgrade, thanks to this Qualcomm-Google partnership
0 user ratings
2024-10-22 19:07:20
By: milo
Nearly Two-Thirds of IT Leaders Have Fallen For Phishing Attacks
0 user ratings
2024-10-22 19:00:22
By: milo
US officials warn foreign disinformation from Russia may flood post-election period
0 user ratings
2024-10-22 18:48:11
By: milo
Security Assessment Reports: A Complete Overview
0 user ratings
2024-10-22 18:43:29
By: milo
SOC 2 Compliance Requirements and Criteria
0 user ratings
2024-10-22 18:43:29
By: milo
Quality is Priority Zero, Especially for Security
0 user ratings
2024-10-22 18:23:22
By: milo
North Korean Hackers Exploit Internet Explorer Vulnerability to Deploy RokRAT Malware - Petri.com
0 user ratings
2024-10-22 18:21:09
By: milo
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans
0 user ratings
2024-10-22 18:12:19
By: milo
Ecobee is partnering with Yale and August to expand its home security system
0 user ratings
2024-10-22 18:08:43
By: milo
Trend Micro ZDI Hosts Hacking Contest for Vulnerabilities in AI-Enabled Devices - Kilgore News Herald
0 user ratings
2024-10-22 18:05:09
By: milo
Special Halloween Offer: 10% Off All Hosting and DDoS Protection Services!
0 user ratings
2024-10-22 17:55:07
By: milo
Exposed United Nations Database Left Sensitive Information Accessible Online
0 user ratings
2024-10-22 17:52:06
By: milo
USENIX NSDI ’24 – Approximate Caching for Efficiently Serving Text-to-Image Diffusion Models
0 user ratings
2024-10-22 17:39:16
By: milo
USENIX NSDI ’24 – THC: Accelerating Distributed Deep Learning Using Tensor Homomorphic Compression
0 user ratings
2024-10-22 17:39:16
By: milo
DEF CON 32 – AppSec Village – Your CI CD Pipeline Is Vulnerable, But It’s Not Your Fault
0 user ratings
2024-10-22 17:39:16
By: milo
This forum has 156 pages of posts.
 
all forums
new post



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.