National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion
0 user ratings
2025-10-22 12:23:28
By: milo
Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data
0 user ratings
2025-10-22 11:58:25
By: milo
Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions
0 user ratings
2025-10-22 11:31:40
By: milo
Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data
0 user ratings
2025-10-22 10:11:28
By: milo
Vidar Stealer Exploits: Direct Memory Attacks Used to Capture Browser Credentials
0 user ratings
2025-10-22 08:04:18
By: milo
Millions of Credentials Stolen Each Day by Stealer Malware
0 user ratings
2025-10-22 07:03:24
By: milo
New Rust Malware ChaosBot Hides Command-and-Control Inside Discord
0 user ratings
2025-10-22 06:36:16
By: milo
New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading
0 user ratings
2025-10-22 05:50:19
By: milo
Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets
0 user ratings
2025-10-22 05:04:21
By: milo
A US judge orders Mark Zuckerberg, Evan Spiegel, and Adam Mosseri to testify in the "first bellwether trial" over child social media safety,
0 user ratings
2025-10-21 16:16:28
By: milo
How To Recover Your Hacked Email or Social Media Account - Consumer Advice Federal Trade Commission (.gov)
0 user ratings
2025-10-21 15:55:19
By: milo
Microsoft 365 Copilot Flaw Lets Hackers Steal Sensitive Data via Indirect Prompt Injection
0 user ratings
2025-10-21 13:53:08
By: milo
PassiveNeuron Targets High-Profile Servers to Deploy Malware
0 user ratings
2025-10-21 13:36:13
By: milo
New Luma Infostealer Malware Steals Browser Data, Cryptocurrency, and Remote Access Accounts
0 user ratings
2025-10-21 13:00:04
By: milo
Decoding Microsoft 365 Audit Logs Using Bitfield Mapping: An Investigation Report
0 user ratings
2025-10-21 12:31:18
By: milo
Apache Syncope Groovy Flaw Allows Remote Code Injection
0 user ratings
2025-10-21 12:22:10
By: milo
Threat Actors Reportedly Marketing Monolock Ransomware on Dark Web Forums
0 user ratings
2025-10-21 11:34:13
By: milo
New GlassWorm Threat Uses Stealthy Code to Target OpenVSX Extensions
0 user ratings
2025-10-21 11:14:16
By: milo
CISO s Checklist: 3 Steps to Beating Alert Fatigue
0 user ratings
2025-10-21 10:50:42
By: milo
LANSCOPE Endpoint Manager Flaw Allows Remote Code Execution
0 user ratings
2025-10-21 09:59:15
By: milo
AWS Resolves Major Outage After Nearly 24 Hours of Service Disruption
0 user ratings
2025-10-21 09:50:06
By: milo
Cavalry Werewolf APT Targets Multiple Sectors Using FoalShell and StallionRAT
0 user ratings
2025-10-21 07:55:12
By: milo
AdaptixC2 Emerges in npm Supply-Chain Exploit Against Developers
0 user ratings
2025-10-21 07:07:12
By: milo
CISA Warns of Oracle E-Business Suite SSRF Vulnerability Actively Exploited in Attacks
0 user ratings
2025-10-21 06:30:18
By: milo
Pakistani Cyber Actors Impersonating ‘NIC eEmail Services’ to Target Indian Government
0 user ratings
2025-10-21 06:01:14
By: milo
This forum has 61 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.