National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Microsoft to Restrict Use of OnMicrosoft Domains for Email Sending
0 user ratings
2025-08-22 12:18:15
By: milo
AI Systems Capable of Generating Working Exploits for CVEs in Just 10 15 Minutes
0 user ratings
2025-08-22 11:53:09
By: milo
Rogue Go Module Doubles as Fast SSH Brute-Forcer, Sends Stolen Passwords via Telegram
0 user ratings
2025-08-22 11:44:23
By: milo
Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools
0 user ratings
2025-08-22 10:52:15
By: milo
Malicious PDFs in Play: UAC-0057 Leveraging Invitations to Trigger Shell Script Attacks
0 user ratings
2025-08-22 09:38:03
By: milo
Stealth Threat Unpacked: Weaponized RAR Files Deliver VShell Backdoor on Linux Systems
0 user ratings
2025-08-22 08:39:09
By: milo
Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise
0 user ratings
2025-08-22 08:05:33
By: milo
Colt Confirms Ransomware Attack Resulted in Customer Data Theft
0 user ratings
2025-08-22 07:48:21
By: milo
NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems
0 user ratings
2025-08-22 06:58:15
By: milo
Windows Docker Desktop Vulnerability Allows Full Host Compromise
0 user ratings
2025-08-22 05:51:12
By: milo
14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks
0 user ratings
2025-08-22 05:42:25
By: milo
New HTTP Smuggling Technique Allows Hackers to Inject Malicious Requests
0 user ratings
2025-08-22 05:33:17
By: milo
ChatGPT-5 Downgrade Attack Allows Hackers to Evade AI Defenses With Minimal Prompts
0 user ratings
2025-08-22 04:59:26
By: milo
Threat Actors Exploiting Victims Machines for Bandwidth Monetization
0 user ratings
2025-08-21 20:08:12
By: milo
Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data
0 user ratings
2025-08-21 19:11:20
By: milo
AI Website Generators Repurposed by Adversaries for Malware Campaigns
0 user ratings
2025-08-21 18:16:30
By: milo
Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft
0 user ratings
2025-08-21 17:17:28
By: milo
Threat Actors Abuse Internet Archive to Host Stealthy JScript Loader
0 user ratings
2025-08-21 16:28:23
By: milo
Paper Werewolf Exploits WinRAR Zero-Day Vulnerability to Deliver Malware
0 user ratings
2025-08-21 15:23:20
By: milo
MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks
0 user ratings
2025-08-21 15:23:20
By: milo
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
0 user ratings
2025-08-21 14:50:29
By: milo
Sliver in a Cyberwar – Kerberoasting and DACL Abuse
0 user ratings
2025-08-21 14:23:38
By: milo
FBI Warns Russian State Hackers Targeting Critical Infrastructure Networking Devices
0 user ratings
2025-08-21 13:46:22
By: milo
Kali Vagrant Rebuilt Released with Pre-Configured Command-Line VMs
0 user ratings
2025-08-21 13:21:28
By: milo
High-Severity Mozilla Flaws Allow Remote Code Execution
0 user ratings
2025-08-21 13:05:24
By: milo
This forum has 65 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.