National Cyber Warfare Foundation (NCWF)

Red Team (CNA) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses
0 user ratings
2025-05-29 17:46:13
By: milo
Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks
0 user ratings
2025-05-29 17:09:15
By: milo
Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data
0 user ratings
2025-05-29 14:31:04
By: milo
Criminal IP Set to Make Its Debut at Infosecurity Europe 2025
0 user ratings
2025-05-29 14:15:09
By: milo
Windows 11 File Explorer Vulnerability Enables NTLM Hash Theft
0 user ratings
2025-05-29 13:52:05
By: milo
Dark Partner Hackers Leverage Fake AI, VPN, and Crypto Sites to Target macOS and Windows Users
0 user ratings
2025-05-29 13:23:17
By: milo
New Microsoft Entra Connect Update Replaces Legacy Login Methods
0 user ratings
2025-05-29 13:08:45
By: milo
New PumaBot Hijacks IoT Devices via SSH Brute-Force for Persistent Access
0 user ratings
2025-05-29 13:01:14
By: milo
Hackers Exploit Cloudflare Tunnels to Launch Stealthy Cyberattacks
0 user ratings
2025-05-29 12:31:44
By: milo
Critical Argo CD Flaw Exposes Kubernetes Clusters to Full Resource Manipulation
0 user ratings
2025-05-29 12:31:43
By: milo
CVE-2025-48045, CVE-2025-48046, CVE-2025-48047: MICI NetFax Server Product Vulnerabilities (NOT FIXED)
0 user ratings
2025-05-29 12:05:59
By: milo
UTG-Q-015 Hackers Launch Massive Brute-Force Attacks on Government Web Servers
0 user ratings
2025-05-29 11:04:07
By: milo
CISA Releases Dedicated SIEM & SOAR Guide for Cybersecurity Professionals
0 user ratings
2025-05-29 10:55:18
By: milo
Critical Dell PowerStore T Vulnerability Allows Full System Compromise
0 user ratings
2025-05-29 10:47:08
By: milo
New Research Reveals Key TCP SYN Patterns for Detecting Malicious Activity
0 user ratings
2025-05-29 10:33:12
By: milo
Victoria s Secret Website Taken Offline After Cybersecurity Breach
0 user ratings
2025-05-29 10:11:10
By: milo
New Spear-Phishing Campaign Targets Financial Executives with NetBird Malware
0 user ratings
2025-05-29 09:40:25
By: milo
New ChoiceJacking Exploit Targets Android and iOS via Infected Charging Ports
0 user ratings
2025-05-29 09:33:09
By: milo
Debugging Hero is a cute hack n' slash where you tweak enemy stats on the fly - Rock Paper Shotgun
0 user ratings
2025-05-29 09:20:30
By: milo
Woodpecker: Red Teaming Tool Targets AI, Kubernetes, and API Vulnerabilities
0 user ratings
2025-05-29 08:31:09
By: milo
Massive Botnet Targets ASUS Routers by Injecting Malicious SSH Keys
0 user ratings
2025-05-29 08:01:19
By: milo
Malicious WordPress Plugin Disguised as Java Update Infects Site Visitors
0 user ratings
2025-05-29 07:52:10
By: milo
APT Hackers Turn Google Calendar Into Command Hub Using TOUGHPROGRESS Malware, Google Alerts
0 user ratings
2025-05-29 06:59:17
By: milo
Critical OneDrive Flaw Lets Malicious Websites Access All Your Files
0 user ratings
2025-05-29 06:59:17
By: milo
Zanubis Android Malware Harvests Banking Credentials and Executes Remote Commands
0 user ratings
2025-05-28 17:32:43
By: milo
This forum has 217 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.