National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
WatchGuard Firebox Vulnerabilities Let Hackers Skip Integrity Validation and Plant Malicious Code
0 user ratings
2025-12-08 12:05:41
By: milo
OceanLotus Targets Xinchuang Ecosystem with Sophisticated Supply Chain Attacks
0 user ratings
2025-12-08 12:05:41
By: milo
CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation
0 user ratings
2025-12-08 12:05:40
By: milo
Porsche Cars Disabled After Major Failure in Installed Satellite Security System
0 user ratings
2025-12-08 12:05:40
By: milo
LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks
0 user ratings
2025-12-08 12:05:40
By: milo
LockBit 5.0 Infrastructure Exposed as Hackers Leak Critical Server Data
0 user ratings
2025-12-08 06:28:57
By: milo
Critical Vulnerabilities Found in GitHub Copilot, Gemini CLI, Claude, and Other AI Tools Affect Millions
0 user ratings
2025-12-08 06:28:57
By: milo
Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes
0 user ratings
2025-12-08 06:28:56
By: milo
Shanya EDR Killer: The New Favorite Tool for Ransomware Operators
0 user ratings
2025-12-08 06:28:56
By: milo
Indonesia s Gambling Industry Reveals Clues of Nationwide Cyber Involvement
0 user ratings
2025-12-08 06:28:56
By: milo
Critical React2Shell RCE Flaw Actively Exploited to Run Malicious Code
0 user ratings
2025-12-08 06:28:56
By: milo
IP Cameras Hacked in Changing Rooms and Pools Used for Sexual Exploitation... Now Telecom Companies Also Held Accountable -
0 user ratings
2025-12-07 05:34:57
By: milo
Malicious Go Packages Impersonate Google s UUID Library to Steal Sensitive Data
0 user ratings
2025-12-06 20:13:30
By: milo
Barts Health NHS Reveals Data Breach Linked to Oracle Zero-Day Exploited by Clop Ransomware
0 user ratings
2025-12-06 20:13:30
By: milo
Digital Forensics: An Introduction to Basic Linux Forensics
0 user ratings
2025-12-06 15:17:48
By: milo
FvncBot Android Malware Steals Keystrokes and Injects Harmful Payloads
0 user ratings
2025-12-06 08:13:41
By: milo
2.15M Next.js Web Services Exposed Online, Active Attacks Reported – Update Immediately
0 user ratings
2025-12-06 08:13:41
By: milo
Chinese hackers exploiting React2Shell bug impacting countless websites, Amazon researchers say - The Record from Recorded Future News
0 user ratings
2025-12-06 07:12:04
By: milo
Metasploit Wrap-Up 12 05 2025
0 user ratings
2025-12-05 21:24:26
By: milo
Sprocket Security Earns Repeat Recognition in G2 s Winter 2025 Relationship Index for Penetration Testing
0 user ratings
2025-12-05 15:25:52
By: milo
MuddyWater Hackers Use UDPGangster Backdoor to Bypass Network Defenses on Windows
0 user ratings
2025-12-05 15:24:02
By: milo
Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations
0 user ratings
2025-12-05 15:24:02
By: milo
Apache Tika Core Flaw Allows Attackers to Exploit Systems with Malicious PDF Uploads
0 user ratings
2025-12-05 15:24:02
By: milo
Avast Antivirus Sandbox Vulnerabilities Allow Privilege Escalation
0 user ratings
2025-12-05 15:24:01
By: milo
Network Security: Get Started with QUIC and HTTP 3
0 user ratings
2025-12-05 14:55:08
By: milo
This forum has 55 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.