National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques
0 user ratings
2025-05-04 02:21:10
By: milo
AJ Styles Reveals How His Social Media Account Was Hacked - Wrestlezone
0 user ratings
2025-05-04 02:16:55
By: milo
Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA
0 user ratings
2025-05-04 01:17:18
By: milo
Threat Actors Target Critical National Infrastructure with New Malware and Tools
0 user ratings
2025-05-04 00:07:24
By: milo
New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts
0 user ratings
2025-05-03 23:06:04
By: milo
Subscription-Based Scams Targeting Users to Steal Credit Card Information
0 user ratings
2025-05-03 22:09:52
By: milo
RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists
0 user ratings
2025-05-03 16:47:15
By: milo
Hackers Weaponize Go Modules to Deliver Disk Wiping Malware, Causing Massive Data Loss
0 user ratings
2025-05-03 16:40:05
By: milo
Black Hat Asia 2025 NOC: Innovation in SOC
0 user ratings
2025-05-03 00:50:48
By: milo
Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives
0 user ratings
2025-05-02 22:12:10
By: milo
State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape
0 user ratings
2025-05-02 21:50:52
By: milo
Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications
0 user ratings
2025-05-02 21:50:52
By: milo
NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys
0 user ratings
2025-05-02 21:35:06
By: milo
Tsunami Malware Surge: Blending Miners and Credential Stealers in Active Attacks
0 user ratings
2025-05-02 21:14:03
By: milo
The Double-Edged Sword of AI in Cybersecurity: Threats, Defenses & the Dark Web Insights Report 2025
0 user ratings
2025-05-02 20:51:49
By: milo
Hackers Exploit New Eye Pyramid Offensive Tool With Python to Launch Cyber Attacks
0 user ratings
2025-05-02 20:35:05
By: milo
Hackers Exploit Critical NodeJS Vulnerabilities to Hijack Jenkins Agents for RCE
0 user ratings
2025-05-02 20:12:56
By: milo
New MCP-Based Attack Techniques and Their Application in Building Advanced Security Tools
0 user ratings
2025-05-02 19:52:22
By: milo
Metasploit Wrap-Up 05 02 2025
0 user ratings
2025-05-02 19:44:11
By: milo
Cyberattack Targets Iconic UK Retailer Harrods
0 user ratings
2025-05-02 19:24:08
By: milo
Why CISOs Are Adopting DevSecOps for Secure Software Development
0 user ratings
2025-05-02 19:09:09
By: milo
Nebulous Mantis hackers have Deployed the RomCom RAT globally, Targeting organizations.
0 user ratings
2025-05-02 19:09:09
By: milo
Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists
0 user ratings
2025-05-02 09:21:41
By: milo
Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands
0 user ratings
2025-05-02 08:59:32
By: milo
CISA Issues New ICS Advisories Addressing Critical Vulnerabilities and Exploits
0 user ratings
2025-05-02 07:15:06
By: milo
This forum has 73 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.