National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Sedgwick Acknowledges Data Breach After TridentLocker Ransomware Claim
0 user ratings
2026-01-07 08:12:06
By: milo
Court Demands OpenAI Hand Over 20M Anonymized ChatGPT Chats in AI Copyright Dispute
0 user ratings
2026-01-07 08:12:06
By: milo
Veeam Backup Vulnerability Exposes Systems to Root-Level Remote Code Execution
0 user ratings
2026-01-07 08:12:05
By: milo
Black Cat Hacker Group Uses Fake Notepad++ Websites to Distribute Malware and Steal Data
0 user ratings
2026-01-07 08:12:05
By: milo
Google Warns of High-Risk WebView Vulnerability That Breaks Security Controls
0 user ratings
2026-01-07 08:12:05
By: milo
Drone Hacking: Build Your Own Hacking Drone, Part 1
0 user ratings
2026-01-06 14:22:55
By: milo
Cursor, Windsurf & Google Antigravity IDEs Linked to Malicious Extension Exposure
0 user ratings
2026-01-06 14:12:07
By: milo
New ClickFix Attack Uses Fake BSOD to Trick Users into Running Malicious Code
0 user ratings
2026-01-06 14:12:07
By: milo
macOS Flaw Allows TCC Bypass, Exposing Sensitive User Information
0 user ratings
2026-01-06 14:12:06
By: milo
Critical AdonisJS Vulnerability Allows Remote Attackers to Write Files on Server
0 user ratings
2026-01-06 14:12:06
By: milo
Threat Actors Exploit Commodity Loader in Targeted Email Campaigns Against Organizations
0 user ratings
2026-01-06 14:12:06
By: milo
Threat Actors Exploit Office Assistant to Deliver Malicious Mltab Browser Plugin
0 user ratings
2026-01-06 14:12:05
By: milo
Copilot, Recall, and Other AI Tools Can Be Removed from Windows 11 with New Tool
0 user ratings
2026-01-06 14:12:05
By: milo
New n8n Vulnerability Allows Attackers to Execute Arbitrary Commands
0 user ratings
2026-01-06 14:12:05
By: milo
CloudEyE MaaS Downloader and Cryptor Infects Over 100,000 Users Globally
0 user ratings
2026-01-06 14:12:05
By: milo
Metasploit 2025 Annual Wrap-Up
0 user ratings
2026-01-05 21:51:27
By: milo
Digital Forensics: Basic Linux Analysis After Data Exfiltration
0 user ratings
2026-01-05 18:30:10
By: milo
Multiple Flaws in QNAP Tools Allow Attackers to Steal Sensitive Data
0 user ratings
2026-01-05 14:06:33
By: milo
Eaton Vulnerabilities Allow Attackers to Execute Arbitrary Code on Host Systems
0 user ratings
2026-01-05 14:06:33
By: milo
Threat Actors Abuse Trusted Business Infrastructure to Host Infostealers
0 user ratings
2026-01-05 14:06:32
By: milo
PyArmor Obfuscation as a Method to Hinder Static and Signature-Based Analysis
0 user ratings
2026-01-05 14:06:32
By: milo
GHOSTCREW: AI-Powered Red Team Toolkit Integrating Metasploit, Nmap, and More
0 user ratings
2026-01-05 14:06:32
By: milo
Crimson Collective Claims Alleged Breach of Brightspeed Fiber Network
0 user ratings
2026-01-05 14:06:32
By: milo
ProfileHound: Post-Escalation Tool Designed to Achieve Red Team Objectives
0 user ratings
2026-01-05 14:06:31
By: milo
Kimwolf Botnet Exploits 2 Million Devices to Build a Global Proxy Infrastructure
0 user ratings
2026-01-05 14:06:31
By: milo
This forum has 57 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.