National Cyber Warfare Foundation (NCWF)

Red Team (CNA) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
Haozi s Plug-and-Play Phishing Attack Steals Over $280,000 From Users
0 user ratings
2025-06-02 11:32:16
By: milo
Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows
0 user ratings
2025-06-02 11:15:18
By: milo
New PyPI Supply Chain Attacks Target Python and NPM Users on Windows and Linux
0 user ratings
2025-06-02 11:15:18
By: milo
CISO Roles Take on Strategic Security Leadership Roles Beyond Cybersecurity as Organizations
0 user ratings
2025-06-02 10:53:13
By: milo
Over 50,000 Azure AD Users’ Access Tokens Exposed via Unauthenticated API Endpoint
0 user ratings
2025-06-02 10:29:12
By: milo
Critical Denodo Scheduler Flaw Allows Remote Code Execution by Attackers
0 user ratings
2025-06-02 09:56:20
By: milo
Active Exploits Detected Targeting Critical vBulletin Vulnerability
0 user ratings
2025-06-02 08:56:17
By: milo
Critical Roundcube Flaw Allows Remote Code Execution by Attackers
0 user ratings
2025-06-02 08:33:15
By: milo
New Study Reveals Vulnerable Code Pattern Putting GitHub Projects at Risk of Path Traversal Attacks
0 user ratings
2025-06-02 08:26:06
By: milo
Severe Vulnerabilities in Consilium CS5000 Fire Panels Allow Remote System Takeover
0 user ratings
2025-06-02 07:47:06
By: milo
MITRE Releases Roadmap for Transition to Post-Quantum Cryptography
0 user ratings
2025-06-02 07:24:23
By: milo
New Linux Security Bugs Could Expose Password Hashes Across Millions of Devices
0 user ratings
2025-06-02 06:54:12
By: milo
Twitter (X) Strategic OSINT Techniques
0 user ratings
2025-06-01 17:46:14
By: milo
Metasploit Wrap-Up 05 30 2025
0 user ratings
2025-05-30 18:12:36
By: milo
Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments
0 user ratings
2025-05-30 16:54:40
By: milo
Threat Actors Exploit Google Apps Script to Host Phishing Sites
0 user ratings
2025-05-30 15:48:09
By: milo
Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
0 user ratings
2025-05-30 15:19:17
By: milo
Beware: Weaponized AI Tool Installers Infect Devices with Ransomware
0 user ratings
2025-05-30 14:57:22
By: milo
Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
0 user ratings
2025-05-30 14:28:40
By: milo
Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges
0 user ratings
2025-05-30 14:13:49
By: milo
Seeing Is Securing: How Surface Command Expands MDR Visibility and Impact
0 user ratings
2025-05-30 14:03:03
By: milo
Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks
0 user ratings
2025-05-30 13:59:09
By: milo
Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates
0 user ratings
2025-05-30 13:44:18
By: milo
Hackers Use Gh0st RAT to Hijack Internet Caf Systems for Crypto Mining
0 user ratings
2025-05-30 13:36:58
By: milo
Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors
0 user ratings
2025-05-30 13:08:16
By: milo
This forum has 333 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.