National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware
0 user ratings
2025-04-02 18:08:08
By: milo
New Malware Targets Magic Enthusiasts to Steal Logins
0 user ratings
2025-04-02 18:00:28
By: milo
SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers
0 user ratings
2025-04-02 18:00:28
By: milo
Hackers Exploit Cloudflare for Advanced Phishing Attacks
0 user ratings
2025-04-02 17:53:20
By: milo
Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack
0 user ratings
2025-04-02 17:46:03
By: milo
Preview the Action: Two New Sessions Available Before Take Command 2025
0 user ratings
2025-04-02 16:53:23
By: milo
A Rebirth of a Cursed Existence? Examining Babuk Locker 2.0 Ransomware
0 user ratings
2025-04-02 15:44:01
By: milo
Firefox 137 Launches with Patches for High-Severity Security Flaws
0 user ratings
2025-04-02 13:16:19
By: milo
Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers
0 user ratings
2025-04-02 13:08:03
By: milo
A Rebirth of a Cursed Existence? - The Babuk Locker 2.0
0 user ratings
2025-04-02 13:01:07
By: milo
Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination
0 user ratings
2025-04-02 12:34:19
By: milo
Prince Ransomware – An Automated Open-Source Ransomware Builder Freely Available on GitHub
0 user ratings
2025-04-02 12:12:16
By: milo
QR Code Phishing (Quishing) Attack Your Smartphones To Steal Microsoft Accounts Credentials
0 user ratings
2025-04-02 12:12:16
By: milo
20,000 WordPress Sites at Risk of File Upload & Deletion Exploits
0 user ratings
2025-04-02 12:12:16
By: milo
North Korea IT Workers Expand Their Employment Across Europe To Infiltrate the Company Networks
0 user ratings
2025-04-02 11:26:31
By: milo
Gootloader Malware Spreads via Google Ads with Weaponized Documents
0 user ratings
2025-04-02 11:12:08
By: milo
Hackers Hijack Telegram Accounts via Default Voicemail Passwords
0 user ratings
2025-04-02 11:12:08
By: milo
Researchers Discover Malicious Android Apps Exploiting .NET MAUI
0 user ratings
2025-04-02 10:23:49
By: milo
Google Introduces End-to-End Encryption for Gmail Business Users
0 user ratings
2025-04-02 09:38:19
By: milo
New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time
0 user ratings
2025-04-02 09:01:19
By: milo
Hackers Exploit JavaScript & CSS Tricks to Steal Browsing History
0 user ratings
2025-04-02 08:02:11
By: milo
Python Introduces New Standard Lock File Format for Enhanced Security
0 user ratings
2025-04-02 07:13:25
By: milo
Hackers Exploit Microsoft Teams Messages to Deliver Malware
0 user ratings
2025-04-02 07:06:17
By: milo
Hackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems
0 user ratings
2025-04-02 06:44:13
By: milo
CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability
0 user ratings
2025-04-02 05:14:16
By: milo
This forum has 17 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.