National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism
0 user ratings
2026-01-20 08:23:35
By: milo
Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds
0 user ratings
2026-01-20 07:11:34
By: milo
SolyxImmortal Malware Abuses Discord to Quietly Harvest Sensitive Information
0 user ratings
2026-01-20 06:35:34
By: milo
WhisperPair Vulnerability Allows Attackers to Pair Devices Without User Consent
0 user ratings
2026-01-20 06:35:33
By: milo
Critical AVEVA Software Flaws Allow Remote Code Execution With SYSTEM Privileges
0 user ratings
2026-01-20 05:23:33
By: milo
Google Ads Exploited to Deliver TamperedChef Through Malicious PDF Editor
0 user ratings
2026-01-20 05:14:34
By: milo
Google Gemini Flaw Allows Access to Private Meeting Details Through Calendar Events
0 user ratings
2026-01-20 05:14:34
By: milo
Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host
0 user ratings
2026-01-20 04:56:33
By: milo
How I used GPT-5.2-Codex to solve a mystery bug and hosting nightmare - in under an hour
0 user ratings
2026-01-19 17:07:04
By: milo
Digital Forensics: Browser Fingerprinting, Part 2 – Audio and Cache-Based Tracking Methods
0 user ratings
2026-01-19 14:33:39
By: milo
Hacktivists hijacked Iran s state TV to air anti-regime messages and an appeal to protest from Reza Pahlavi - Security Affairs
0 user ratings
2026-01-19 14:22:59
By: milo
Visual Studio Code Abused in Sophisticated Multistage Malware Attacks
0 user ratings
2026-01-19 14:14:31
By: milo
Remcos RAT Campaign Uses Trojanized VeraCrypt Installers to Steal Credentials
0 user ratings
2026-01-19 13:41:30
By: milo
Pulsar RAT Abuses Memory-Only Execution and HVNC for Stealthy Remote Takeover
0 user ratings
2026-01-19 13:33:30
By: milo
Redmi Buds Vulnerability Could Allow Call Data Theft and Firmware Instability
0 user ratings
2026-01-19 13:25:34
By: milo
Spear-Phishing Campaign Leverages Google Ads to Distribute EndRAT Malware
0 user ratings
2026-01-19 13:25:34
By: milo
Cybercriminals Impersonate Malwarebytes to Steal User Credentials
0 user ratings
2026-01-19 13:25:33
By: milo
Attackers Rerouted Employee Pay Without Breaching IT Systems
0 user ratings
2026-01-19 13:25:33
By: milo
Attackers Abuse WSL2 to Operate Undetected on Windows Systems
0 user ratings
2026-01-19 13:25:33
By: milo
Unmasked by Leaks: The Hidden Backbone of a Ransomware Operation
0 user ratings
2026-01-19 13:25:32
By: milo
CIRO Confirms Data Breach Impacting 750,000 Canadian Investors
0 user ratings
2026-01-19 13:25:32
By: milo
Windows SMB Client Vulnerability Exposes Organizations to Full Active Directory Compromise
0 user ratings
2026-01-19 13:25:32
By: milo
Five Chrome Extensions Used to Hijack Enterprise HR and ERP Systems
0 user ratings
2026-01-19 09:13:26
By: milo
How Security Teams Use IP Location and DNS History In Cybercrime Investigation
0 user ratings
2026-01-19 08:30:26
By: milo
PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses
0 user ratings
2026-01-19 08:13:27
By: milo
This forum has 60 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.