National Cyber Warfare Foundation (NCWF)

Red Team (CNA) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed
0 user ratings
2025-08-11 15:04:22
By: milo
Meta s New Feature Turns Instagram into a Real-Time Location Broadcaster
0 user ratings
2025-08-11 13:44:24
By: milo
PowerShell for Hackers, Part 3: Exploring PowerView
0 user ratings
2025-08-11 13:30:18
By: milo
Silent Watcher Targets Windows Systems, Steals Data via Discord Webhooks
0 user ratings
2025-08-11 12:23:24
By: milo
Smart Bus System Flaw Allows Hackers to Remotely Track and Control Vehicles
0 user ratings
2025-08-11 12:08:11
By: milo
CastleLoader Malware Hits 400+ Devices via Cloudflare-Themed ClickFix Phishing Attack
0 user ratings
2025-08-11 11:37:25
By: milo
Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks
0 user ratings
2025-08-11 11:21:50
By: milo
Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups
0 user ratings
2025-08-11 10:59:17
By: milo
SoupDealer Malware Evades Sandboxes, AVs, and EDR XDR in Real-World Attacks
0 user ratings
2025-08-11 10:28:03
By: milo
Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope
0 user ratings
2025-08-11 09:11:14
By: milo
Malware Campaign Masquerades as Tesla in Poisoned Google Ads
0 user ratings
2025-08-11 09:11:14
By: milo
Windows RPC Protocol Exploited to Launch Server Spoofing Attacks
0 user ratings
2025-08-11 08:25:21
By: milo
AI Coding Assistant: Creating the Perfect Blueprint for Attackers
0 user ratings
2025-08-11 08:02:33
By: milo
SSHamble: New Open-Source Tool Targets SSH Protocol Flaws
0 user ratings
2025-08-11 07:22:20
By: milo
Efimer Trojan Targets Crypto Wallets Using Phony Legal Notices and Booby-Trapped Torrents
0 user ratings
2025-08-11 06:58:11
By: milo
Xerox FreeFlow Flaws Enable SSRF and Remote Code Execution
0 user ratings
2025-08-11 06:03:18
By: milo
GPT-5 Compromised Using Echo Chamber and Storytelling Exploits
0 user ratings
2025-08-11 05:26:17
By: milo
7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
0 user ratings
2025-08-11 05:09:45
By: milo
xsshunter-express – Self-Hosted Blind XSS Payload Capture and Analysis
0 user ratings
2025-08-11 02:19:30
By: milo
Google Hacked – Approx 2.5 Million Records of Google Ads Customer Data Leaked
0 user ratings
2025-08-10 19:30:11
By: milo
ClickFix macOS Malware Targets User Login Credentials
0 user ratings
2025-08-10 12:08:47
By: milo
APT Sidewinder Mimics Government and Military Agencies to Steal Login Credentials
0 user ratings
2025-08-10 06:40:07
By: milo
Hands-on with Alexa+: fun to talk to and good at handling multistep requests, but it is buggy, unreliable, and worse at some basic tasks than the orig
0 user ratings
2025-08-09 23:01:24
By: milo
Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data
0 user ratings
2025-08-09 10:50:44
By: milo
Critical Linux Kernel Vulnerability Allows Attackers Gain Full Kernel-Level Control From Chrome Sandbox
0 user ratings
2025-08-09 10:01:16
By: milo
This forum has 297 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.