National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
IoTeX Bridge Hacked for $8.8M via Private Key Exploit, IOTX Price Dips - Coinpedia Fintech News
0 user ratings
2026-02-21 13:42:58
By: milo
Anthropic Debuts Claude Code Security – AI Now Scan Vulnerabilities in Your Entire Codebase
0 user ratings
2026-02-21 11:20:29
By: milo
Metasploit Wrap-Up 02 20 2026
0 user ratings
2026-02-20 22:25:15
By: milo
Hacktivism and the Winter Olympics 2026: What We re Seeing and What it Signals
0 user ratings
2026-02-20 16:55:12
By: milo
PayPal Data Breach – 6 Months of Users’ Data Leaked Online
0 user ratings
2026-02-20 15:36:27
By: milo
Silicon Valley Engineers Indicted for Alleged Trade Secret Theft From Google and Tech Firms
0 user ratings
2026-02-20 15:06:28
By: milo
Critical Jenkins Flaw Exposes Build Environments to XSS Attacks
0 user ratings
2026-02-20 15:06:28
By: milo
Google Blocks 1.75 Million Malicious Apps from Entering Play Store
0 user ratings
2026-02-20 13:35:28
By: milo
Grandstream VoIP Phones Vulnerability Grants Attackers Root Privileges
0 user ratings
2026-02-20 12:54:27
By: milo
CharlieKirk Grabber Malware Targets Windows Systems to Steal Login Credentials
0 user ratings
2026-02-20 12:24:27
By: milo
PowerShell for DFIR, Part 3: Audits and ACL Security
0 user ratings
2026-02-20 11:34:19
By: milo
FBI Issues Emergency Alert as Ploutus Malware Drains U.S. ATMs Without Cards or Accounts
0 user ratings
2026-02-20 10:52:27
By: milo
LLM-Generated Passwords Expose Security Risks with Predictability and Weakness
0 user ratings
2026-02-20 09:01:27
By: milo
Google Rushes Out Critical Chrome Update to Address Serious PDFium and V8 Vulnerabilities
0 user ratings
2026-02-20 07:41:27
By: milo
Hackers Exploit Critical BeyondTrust Vulnerability to Deploy VShell and SparkRAT
0 user ratings
2026-02-20 07:01:27
By: milo
Ongoing Campaign Targets Microsoft 365 to Steal OAuth Tokens for Persistent Access
0 user ratings
2026-02-20 06:11:27
By: milo
PromptSpy: First Android AI Malware Leverages Google s Gemini for Decision-Making
0 user ratings
2026-02-20 05:21:28
By: milo
A $10K Bounty Awaits Anyone Who Can Hack Ring Cameras to Stop Sharing Data With Amazon - WIRED
0 user ratings
2026-02-20 02:39:52
By: milo
A $10K Bounty Awaits Anyone Who Can Hack Ring Cameras to Stop Sharing Data With Amazon
0 user ratings
2026-02-20 01:20:05
By: milo
Open Source Intelligence (OSINT): Mapping Physical Infrastructure with Sightline
0 user ratings
2026-02-19 13:20:49
By: milo
China s Parallel CVE Systems Expose Alternate Vulnerability Disclosure Timeline
0 user ratings
2026-02-19 13:18:28
By: milo
Citizen Lab Finds Evidence of Mobile Data Extraction from Detained Kenyan Activist
0 user ratings
2026-02-19 11:38:27
By: milo
Researchers Uncover DoS Vulnerabilities in Socomec DIRIS M-70 IIoT Power Meter via Thread Emulation & Fuzzing
0 user ratings
2026-02-19 10:58:27
By: milo
Microsoft Defender Introduces Centralized Script Library Powered by Copilot for Live Response
0 user ratings
2026-02-19 09:28:27
By: milo
CISA Alerts Organizations to Honeywell CCTV Flaw Enabling Account Takeovers
0 user ratings
2026-02-19 09:18:28
By: milo
This forum has 57 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.