National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations
0 user ratings
2025-04-21 14:18:18
By: milo
Cybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious Emails
0 user ratings
2025-04-21 14:11:16
By: milo
Ransomware Attacks Cost Banks $6.08 Million on Average, Triggering Downtime and Reputation Damage
0 user ratings
2025-04-21 14:11:16
By: milo
RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools
0 user ratings
2025-04-21 13:18:13
By: milo
Top Lessons from Take Command 2025
0 user ratings
2025-04-21 13:03:07
By: milo
Interview with Safety Detectives
0 user ratings
2025-04-21 12:28:10
By: milo
Not so innocent: Malware-laden memes on the rise
0 user ratings
2025-04-21 12:07:46
By: milo
Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
0 user ratings
2025-04-21 11:53:19
By: milo
Hackers Claim to Sell Baldwin Killer Malware That Evades AV and EDR
0 user ratings
2025-04-21 11:39:42
By: milo
New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools
0 user ratings
2025-04-21 09:21:04
By: milo
RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions
0 user ratings
2025-04-21 09:21:04
By: milo
Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations
0 user ratings
2025-04-21 09:13:21
By: milo
Linux 6.15-rc3 Released With Key Kernel Bug Fixes
0 user ratings
2025-04-21 08:58:45
By: milo
Hackers Abuse Zoom s Remote Control to Access Users Computers
0 user ratings
2025-04-21 08:09:08
By: milo
Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
0 user ratings
2025-04-21 07:17:10
By: milo
Critical PyTorch Vulnerability Allows Hackers to Run Remote Code
0 user ratings
2025-04-21 06:55:09
By: milo
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code
0 user ratings
2025-04-21 06:39:15
By: milo
Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security
0 user ratings
2025-04-21 05:48:18
By: milo
Elkeid – A Modern, Scalable HIDS for Cloud-Native Infrastructure
0 user ratings
2025-04-21 01:38:30
By: milo
Writing Effective Detection Rules With Sigma, YARA, And Suricata
0 user ratings
2025-04-20 18:38:02
By: milo
How To Conduct End-to-End Forensics From Compromised Endpoint To Network Pivot
0 user ratings
2025-04-20 18:17:22
By: milo
Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds
0 user ratings
2025-04-20 18:17:22
By: milo
10 Best Patch Management Tools 2025
0 user ratings
2025-04-19 14:37:20
By: milo
10 Best Cloud Security Solutions 2025
0 user ratings
2025-04-19 14:29:13
By: milo
Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access
0 user ratings
2025-04-19 13:09:05
By: milo
This forum has 72 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.