National Cyber Warfare Foundation (NCWF)

Blue Team (CND) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
JFrog finds 100 malicious PyTorch and Tensorflow Keras models on Hugging Face, some of which can execute code on users' machines to give attacke
0 user ratings
2024-03-01 02:22:09
By: milo
What are the elements of an SBOM?
0 user ratings
2024-03-01 01:53:13
By: milo
IBM X-Force Threat Intelligence Index 2024
0 user ratings
2024-03-01 01:46:09
By: milo
Researchers found a zero-click Facebook account takeover - Security Affairs
0 user ratings
2024-03-01 01:41:37
By: milo
A large US health care tech company was hacked. It's leading to billing delays and security concerns - The Associated Press
0 user ratings
2024-02-29 23:30:19
By: milo
Fulton County, Security Experts Call LockBit’s Bluff
0 user ratings
2024-02-29 22:30:07
By: milo
ALPHV Blackcat, GCP-Native Attacks, Bandook RAT, NoaBot Miner, Ivanti Secure Vulnerabilities, and More: Hacker s Playbook Threat Coverage Round-up: Fe
0 user ratings
2024-02-29 22:14:02
By: milo
Amazon recommends video doorbell vulnerable to hacking, report says - Business Insider
0 user ratings
2024-02-29 22:02:09
By: milo
Researchers found a zero-click Facebook account takeover
0 user ratings
2024-02-29 21:43:33
By: milo
Ivanti integrity checker tool needs latest update to work, Five Eyes alert warns
0 user ratings
2024-02-29 21:43:11
By: milo
USENIX Security 23 – Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek – A Study of Multi-Factor and
0 user ratings
2024-02-29 21:16:08
By: milo
Case Study: Why Data-Centric Security Is a Must-Have for the Insurance Sector
0 user ratings
2024-02-29 21:16:08
By: milo
How DSPM Can Help You to Safely Use Microsoft Copilot?
0 user ratings
2024-02-29 21:16:08
By: milo
USENIX Security 23 – Suood Al Roomi, Frank Li – A Large-Scale Measurement of Website Login Policies
0 user ratings
2024-02-29 21:16:07
By: milo
Daniel Stori’s Security Engineer Interview
0 user ratings
2024-02-29 21:16:07
By: milo
CISA warns against using hacked Ivanti devices even after factory resets - BleepingComputer
0 user ratings
2024-02-29 20:48:23
By: milo
This notorious Russian hacking group is threatening to release Trump court documents - Business Insider India
0 user ratings
2024-02-29 20:33:07
By: milo
GitHub enables push protection by default for all public repositories to prevent accidental leaks of secrets like access tokens and API keys when push
0 user ratings
2024-02-29 19:50:19
By: milo
Android Money Transfer XHelper App Exposed as Money Laundering Network
0 user ratings
2024-02-29 19:43:59
By: milo
What CISOs Need To Know About The Lockbit Takedown
0 user ratings
2024-02-29 19:18:09
By: milo
5 Facts About File Integrity Monitoring and HIPAA Integrity Controls
0 user ratings
2024-02-29 19:18:08
By: milo
Cybersecurity Risks and Vulnerabilities with Third-Party Vendors
0 user ratings
2024-02-29 19:10:34
By: milo
A government watchdog hacked a US federal agency to stress-test its cloud security - TechCrunch
0 user ratings
2024-02-29 18:37:10
By: milo
Security Vulnerabilities Popping Up on Hugging Face s AI Platform
0 user ratings
2024-02-29 17:44:12
By: milo
JFrog says it found around a hundred malicious ML models on Hugging Face, some of which can backdoor users' machines (Bill Toulas BleepingCompute
0 user ratings
2024-02-29 17:40:45
By: milo
This forum has 1210 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.