National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Drone Hacking: Build Your Own Hacking Drone, Part 1
0 user ratings
2026-01-06 14:22:55
By: milo
Cursor, Windsurf & Google Antigravity IDEs Linked to Malicious Extension Exposure
0 user ratings
2026-01-06 14:12:07
By: milo
New ClickFix Attack Uses Fake BSOD to Trick Users into Running Malicious Code
0 user ratings
2026-01-06 14:12:07
By: milo
macOS Flaw Allows TCC Bypass, Exposing Sensitive User Information
0 user ratings
2026-01-06 14:12:06
By: milo
Critical AdonisJS Vulnerability Allows Remote Attackers to Write Files on Server
0 user ratings
2026-01-06 14:12:06
By: milo
Threat Actors Exploit Commodity Loader in Targeted Email Campaigns Against Organizations
0 user ratings
2026-01-06 14:12:06
By: milo
Copilot, Recall, and Other AI Tools Can Be Removed from Windows 11 with New Tool
0 user ratings
2026-01-06 14:12:05
By: milo
New n8n Vulnerability Allows Attackers to Execute Arbitrary Commands
0 user ratings
2026-01-06 14:12:05
By: milo
CloudEyE MaaS Downloader and Cryptor Infects Over 100,000 Users Globally
0 user ratings
2026-01-06 14:12:05
By: milo
Threat Actors Exploit Office Assistant to Deliver Malicious Mltab Browser Plugin
0 user ratings
2026-01-06 14:12:05
By: milo
Metasploit 2025 Annual Wrap-Up
0 user ratings
2026-01-05 21:51:27
By: milo
Digital Forensics: Basic Linux Analysis After Data Exfiltration
0 user ratings
2026-01-05 18:30:10
By: milo
Multiple Flaws in QNAP Tools Allow Attackers to Steal Sensitive Data
0 user ratings
2026-01-05 14:06:33
By: milo
Eaton Vulnerabilities Allow Attackers to Execute Arbitrary Code on Host Systems
0 user ratings
2026-01-05 14:06:33
By: milo
PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis
0 user ratings
2026-01-05 14:06:32
By: milo
Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network
0 user ratings
2026-01-05 14:06:32
By: milo
GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
0 user ratings
2026-01-05 14:06:32
By: milo
Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers
0 user ratings
2026-01-05 14:06:32
By: milo
ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives
0 user ratings
2026-01-05 14:06:31
By: milo
Attackers Leverage FortiWeb Vulnerabilities to Deploy Sliver C2 for Long-Term Access
0 user ratings
2026-01-05 14:06:31
By: milo
Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
0 user ratings
2026-01-05 14:06:31
By: milo
Hackers Steal $35M in Cryptocurrency Following LastPass Breach
0 user ratings
2026-01-05 14:06:30
By: milo
What s New in Rapid7 Products & Services: H2 2025 in Review
0 user ratings
2026-01-05 11:52:25
By: milo
MongoBleed CVE-2025-14847: Critical Memory Leak in MongoDB Allowing Attackers to Extract Sensitive Data
0 user ratings
2026-01-05 11:52:25
By: milo
My Top 5 Recommendations on OT Cybersecurity Student Upskilling
0 user ratings
2026-01-05 04:26:14
By: milo
This forum has 60 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.