National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks
0 user ratings
2026-03-27 08:05:08
By: milo
Red Hat Warns of Malware Embedded in Popular Linux Tool, Opening Doors for Unauthorized Access
0 user ratings
2026-03-27 07:41:07
By: milo
Hackers Deploy USB Malware, RATs, and Stealers in Southeast Asian Government Attacks
0 user ratings
2026-03-27 06:53:06
By: milo
Windows Error Reporting Vulnerability Exposes Systems to Privilege Escalation, Allowing SYSTEM Access
0 user ratings
2026-03-27 06:29:07
By: milo
Phishing ZIP Files Used to Deploy PXA Stealer Targeting Financial Firms
0 user ratings
2026-03-27 06:04:07
By: milo
Hackers Implant Stealthy BPFdoor Backdoors in Telecom Networks for Persistent Access
0 user ratings
2026-03-27 05:40:09
By: milo
ISC Issues Critical Warning Over Kea DHCP Vulnerability That Could Remotely Crash Services
0 user ratings
2026-03-27 05:15:09
By: milo
Fake Cloudflare CAPTCHA Pages Deliver Infiniti Stealer Malware on macOS
0 user ratings
2026-03-27 05:15:08
By: milo
TSA lines are chaos and this $209 airport hack is exploding right now - Fast Company
0 user ratings
2026-03-27 01:57:14
By: milo
Q&A with New Mexico AG Ra l Torrez about the New Mexico and LA social media trials, Big Tech's "Big Tobacco" moment, what it means
0 user ratings
2026-03-27 00:51:09
By: milo
New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware
0 user ratings
2026-03-26 15:16:07
By: milo
Leak Bazaar Converts Stolen Corporate Data Into Organized Criminal Marketplace
0 user ratings
2026-03-26 14:12:06
By: milo
VoidLink Rootkit Leverages eBPF and Kernel Modules to Stealthily Infiltrate Linux Systems
0 user ratings
2026-03-26 13:46:07
By: milo
BPFdoor in Telecom Networks: Sleeper Cells in the backbone
0 user ratings
2026-03-26 13:23:53
By: milo
GhostClaw AI Malware Targets macOS Users with Credential-Stealing Payloads
0 user ratings
2026-03-26 12:58:06
By: milo
Drone Hacking: Dronesploit – Metasploit for Drones
0 user ratings
2026-03-26 12:51:27
By: milo
OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns
0 user ratings
2026-03-26 12:25:27
By: milo
CISA Issues Urgent Warning on Langflow Code Injection Vulnerability Actively Exploited in Attacks
0 user ratings
2026-03-26 12:23:06
By: milo
Critical Ivanti EPMM Vulnerabilities Expose Systems to Arbitrary Code Execution Attacks
0 user ratings
2026-03-26 11:56:08
By: milo
Critical NVIDIA Vulnerabilities Risk Remote Code Execution and Denial-of-Service Attacks
0 user ratings
2026-03-26 11:47:07
By: milo
Silver Fox Tax Audit Phishing Campaign Shifts from RATs to Python Stealers
0 user ratings
2026-03-26 11:39:07
By: milo
Torg Grabber Malware Shifts from Telegram Exfiltration to Encrypted REST API for C2
0 user ratings
2026-03-26 10:01:07
By: milo
Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack
0 user ratings
2026-03-26 09:28:07
By: milo
IDrive for Windows Vulnerability Allows Attackers to Escalate Privileges and Gain Unauthorized Access
0 user ratings
2026-03-26 09:04:07
By: milo
The $6M LA social media verdict is a win for the plaintiffs bar, not kids or society; parenting helps limit such harms, and most kids don't face
0 user ratings
2026-03-26 08:38:08
By: milo
This forum has 65 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.