National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Experts say China's new national internet ID, currently voluntary, to sign in across social media apps and sites could further erode already limi
0 user ratings
2025-06-22 00:03:39
By: milo
CyberWarfare on the Rise With Surge in Hacktivist Activity Following Israel-Iran
0 user ratings
2025-06-21 23:07:41
By: milo
DuckDuckGo Browser s Scam Blocker to Guard Against Phishing and Malware Sites
0 user ratings
2025-06-21 22:01:21
By: milo
Open Directories Exposes Publically Available tools Used by Hackers
0 user ratings
2025-06-21 21:01:48
By: milo
Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports
0 user ratings
2025-06-21 20:05:07
By: milo
Microsoft Announces New Graph Powered Detection of Hybrid Attack Targeting Organizations
0 user ratings
2025-06-21 19:06:11
By: milo
Iranian Hacktivist Attacking Israeli Military, Government, and Infrastructure Targets
0 user ratings
2025-06-21 18:07:18
By: milo
If The US Attacks Iran, Will Iran Attack US Industrial Facilities (SCADA ICS)?
0 user ratings
2025-06-21 15:21:18
By: milo
Hackers Target 700+ ComfyUI AI Image Generation Servers to Spread Malware
0 user ratings
2025-06-20 21:35:11
By: milo
Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System
0 user ratings
2025-06-20 21:08:07
By: milo
Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
0 user ratings
2025-06-20 20:41:24
By: milo
Network Espionage: Using Russian Cameras as Proxies to Hide Your Data
0 user ratings
2025-06-20 20:23:09
By: milo
Beware of Weaponized MSI Installer Masquerading as WhatsApp to Deliver XWorm RAT
0 user ratings
2025-06-20 20:17:20
By: milo
Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware
0 user ratings
2025-06-20 19:43:08
By: milo
Threat Actors Manipulate Google Search Results to Display Scammer’s Phone Number Instead of Real Number
0 user ratings
2025-06-20 19:16:43
By: milo
Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection
0 user ratings
2025-06-20 18:51:21
By: milo
Threat Actors Exploit Vercel Hosting Platform to Distribute Remote Access Malware
0 user ratings
2025-06-20 18:25:17
By: milo
TxTag Phishing Campaign Exploits .gov Domain to Deceive Employees
0 user ratings
2025-06-20 18:00:16
By: milo
PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
0 user ratings
2025-06-20 17:27:21
By: milo
How Artificial Intelligence (AI) Large Language Models (LLMs) Work, Part 1
0 user ratings
2025-06-20 16:27:07
By: milo
Network Espionage: Using Russian Cameras as Proxy
0 user ratings
2025-06-20 14:08:19
By: milo
Massive DDoS Attack Hits 7.3 Tbps Delivering 37.4 Terabytes in 45 Seconds
0 user ratings
2025-06-20 13:22:46
By: milo
Azure Misconfiguration Lets Attackers Take Over Cloud Infrastructure
0 user ratings
2025-06-20 13:07:06
By: milo
AntiDot 3-in-1 Android Botnet Malware Grants Attackers Full Control Over Victim Devices
0 user ratings
2025-06-20 11:56:40
By: milo
GitPhish – OAuth Device Code Phishing for GitHub Repos, Secrets, and CI CD
0 user ratings
2025-06-20 11:52:50
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.