National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
US federal contracting records show that US ICE is planning to hire nearly 30 private analysts to monitor social media content for enforcement operati
0 user ratings
2025-10-06 15:41:09
By: milo
New Fully Undetectable Android RAT Discovered on GitHub
0 user ratings
2025-10-06 13:09:11
By: milo
Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools
0 user ratings
2025-10-06 12:34:21
By: milo
TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors
0 user ratings
2025-10-06 11:53:20
By: milo
Zabbix Agent Agent2 for Windows Vulnerability Could Allow Privilege Escalation
0 user ratings
2025-10-06 11:45:14
By: milo
Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks
0 user ratings
2025-10-06 11:20:10
By: milo
Technical Details and Exploit Released for Chrome Remote Code Execution Flaw
0 user ratings
2025-10-06 10:56:05
By: milo
Yurei Ransomware leverages SMB shares and removable drives to Encrypt Files
0 user ratings
2025-10-06 10:06:18
By: milo
Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code
0 user ratings
2025-10-06 08:43:42
By: milo
US federal contracting records suggest US ICE is planning to hire 30 contractors to monitor social media content, seeking leads for enforcement opera
0 user ratings
2025-10-06 08:39:28
By: milo
Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
0 user ratings
2025-10-06 07:30:10
By: milo
Redis Server Use-After-Free Vulnerability Allows Remote Code Execution
0 user ratings
2025-10-06 06:50:14
By: milo
QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution
0 user ratings
2025-10-06 06:25:09
By: milo
Asgard Malware Protector Reversed: Researchers Expose Its Antivirus Bypass Methods
0 user ratings
2025-10-06 06:25:09
By: milo
Hackers Turn AWS X-Ray into Command-and-Control Platform
0 user ratings
2025-10-06 06:08:10
By: milo
PoC Released for Remotely Exploitable Oracle E-Business Suite 0-Day
0 user ratings
2025-10-06 05:33:38
By: milo
WARMCOOKIE Malware Operators Introduce Advanced Capabilities
0 user ratings
2025-10-06 05:33:37
By: milo
PoC Published for Sudo Flaw Lets Attackers Escalate to Root
0 user ratings
2025-10-06 05:25:08
By: milo
A profile of Riley Walz, whose tech-related pranks in San Francisco blend technical skill with social commentary, including a viral site to track park
0 user ratings
2025-10-06 05:14:03
By: milo
GWI: Time spent on social media globally peaked in 2022 and is steadily declining; North America is the exception, with usage up 15% in 2024 compared
0 user ratings
2025-10-04 18:33:10
By: milo
Top 10 Best End-to-End Threat Intelligence Companies in 2025
0 user ratings
2025-10-03 17:34:17
By: milo
Advanced Linux Persistence: Strategies for Remaining Inside a Linux Target
0 user ratings
2025-10-03 16:47:29
By: milo
Top 10 Best Supply Chain Risk Management Solutions in 2025
0 user ratings
2025-10-03 15:16:10
By: milo
Lately: OpenAI s new social media app, YouTube s Trump settlement and a hacker doc series - The Globe and Mail
0 user ratings
2025-10-03 14:53:39
By: milo
New Android Spyware Targeting Users by Imitating Signal and ToTok Apps
0 user ratings
2025-10-03 13:32:33
By: milo
This forum has 61 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.