National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
HPE AutoPass Vulnerability Allows Remote Attackers to Bypass Authentication
0 user ratings
2026-03-03 11:48:06
By: milo
New ‘StegaBin’ Campaign Deploys Multi-Stage Credential Stealer via 26 Malicious npm Packages
0 user ratings
2026-03-03 11:22:06
By: milo
Fortinet FortiGate Devices Targeted by CyberStrikeAI, Allowing Hackers to Bypass Security
0 user ratings
2026-03-03 10:49:05
By: milo
Hackers Exploit Telegram for Initial Access to Corporate VPN, RDP, and Cloud Systems
0 user ratings
2026-03-03 10:33:07
By: milo
Epic Fury Cyber Shock: Iran s Internet Down, Hacktivists Hit Back
0 user ratings
2026-03-03 10:08:05
By: milo
MS-Agent Vulnerability Exposes AI Agents to Remote Hijacking, Granting Full System Control
0 user ratings
2026-03-03 08:23:08
By: milo
Malvertising Campaign Spreads AMOS malext macOS Infostealer via Fake Text-Sharing Ads
0 user ratings
2026-03-03 07:51:05
By: milo
Hackerbot-Claw Bot Exploits GitHub Actions CI CD Flaw to Attack Microsoft and DataDog
0 user ratings
2026-03-03 07:03:07
By: milo
Google Chrome Introduces Merkle Tree Certificates to Protect HTTPS from Quantum Attacks
0 user ratings
2026-03-03 07:03:06
By: milo
Cyberattackers Exploit OpenVSX Aqua Trivy with Malicious AI Prompts to Hijack Coding Tools
0 user ratings
2026-03-03 06:07:06
By: milo
Angular i18n Flaw Lets Hackers Execute Malicious Code via Critical XSS Vulnerability
0 user ratings
2026-03-03 06:07:06
By: milo
Android Security Update Fixes 129 Flaws and Tackles Actively Exploited Zero-Day Flaw
0 user ratings
2026-03-03 05:51:06
By: milo
AuraStealer Infostealer Targeting Users with 48 C2 Domains in Ongoing Campaigns
0 user ratings
2026-03-03 05:20:07
By: milo
Chrome Gemini Vulnerability Lets Attackers Access Victims Camera and Microphone Remotely
0 user ratings
2026-03-03 04:48:07
By: milo
Digital Forensics: Scanning for Malicious Bluetooth Devices
0 user ratings
2026-03-02 21:09:28
By: milo
When Trusted Authentication Enables Privilege Escalation
0 user ratings
2026-03-02 20:29:42
By: milo
Open Source Intelligence (OSINT): Ukrainian Hacktivists Publish Massive Database of Russian Defense Facilities and Employee Data
0 user ratings
2026-03-02 15:00:33
By: milo
Save the Date: Rapid7 s 2026 Global Cybersecurity Summit May 12 13
0 user ratings
2026-03-02 14:49:56
By: milo
MSHTML Zero-Day in Windows Exploited by APT28 Prior to Feb 2026 Security Update
0 user ratings
2026-03-02 13:37:09
By: milo
TPMS Flaw in Toyota, Mercedes, and Other Major Brands Enables Covert Vehicle Tracking
0 user ratings
2026-03-02 13:29:09
By: milo
Proof-of-Concept Released for Windows ALPC Privilege Escalation via Error Reporting
0 user ratings
2026-03-02 13:12:09
By: milo
UXSS Vulnerability in DuckDuckGo Browser s AutoConsent JS Bridge Allows Cross-Origin Attacks
0 user ratings
2026-03-02 12:48:09
By: milo
OneUptime Command Injection Vulnerability Poses Major Risk of Full System Takeover
0 user ratings
2026-03-02 12:22:28
By: milo
Langflow CSV Agent Flaw Could Let Attackers Execute Arbitrary Code
0 user ratings
2026-03-02 12:10:30
By: milo
GTFire Phishing Campaign Exploits Google Services to Bypass Detection and Harvest Credentials
0 user ratings
2026-03-02 12:10:30
By: milo
This forum has 57 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.