National Cyber Warfare Foundation (NCWF)

Red Team (CNA) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
GitHub Outage Hits Users Globally, Core Services Unavailable
0 user ratings
2025-07-29 06:41:09
By: milo
PoC Exploit Published for Actively Exploited Cisco Identity Services Engine Flaw
0 user ratings
2025-07-29 06:23:13
By: milo
CISA Issues Alert on Cisco Identity Services Engine Flaw Exploited in Active Attacks
0 user ratings
2025-07-29 06:14:26
By: milo
Aeroflot Hit by Year Long Cyber Operation That Allegedly Wiped 7,000 Servers
0 user ratings
2025-07-29 05:01:13
By: milo
UNC3886 Exploits Multiple 0-Day Bugs in VMware vCenter, ESXi, and Fortinet FortiOS
0 user ratings
2025-07-29 04:52:47
By: milo
ArmouryLoader Bypasses Security Protections to Inject Malicious Code
0 user ratings
2025-07-28 19:36:16
By: milo
ToolShell: Uncovering Five Critical Vulnerabilities in Microsoft SharePoint
0 user ratings
2025-07-28 19:12:11
By: milo
Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
0 user ratings
2025-07-28 18:47:07
By: milo
This new Wyze lamp socket is the outdoor smart home upgrade I've been waiting for
0 user ratings
2025-07-28 18:16:29
By: milo
Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems
0 user ratings
2025-07-28 18:14:16
By: milo
UNC3886 Hackers Target Singapore s Critical Infrastructure by Exploiting 0-Day Vulnerabilities
0 user ratings
2025-07-28 17:32:23
By: milo
Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info
0 user ratings
2025-07-28 17:09:14
By: milo
Argus – Ultimate Reconnaissance Toolkit for Offensive Recon Operations
0 user ratings
2025-07-28 16:17:30
By: milo
Taking Over a Russian Domain using Techniques from Digital Forensics
0 user ratings
2025-07-28 14:20:09
By: milo
LLM Honeypots Deceive Hackers into Exposing Attack Methods
0 user ratings
2025-07-28 13:59:13
By: milo
10 Best Ethical Hacking Service Providers in 2025
0 user ratings
2025-07-28 13:11:22
By: milo
NPM ‘is’ Package with 2.8M Weekly Downloads Exploited in Attack on Developers
0 user ratings
2025-07-28 13:11:21
By: milo
Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
0 user ratings
2025-07-28 12:47:16
By: milo
Atomic macOS Stealer Upgraded with Remote Access Backdoor
0 user ratings
2025-07-28 12:15:05
By: milo
Inside Muddled Libra s Playbook: Call Center Attacks for Initial Breach
0 user ratings
2025-07-28 11:51:22
By: milo
Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures
0 user ratings
2025-07-28 11:27:17
By: milo
400,000 WordPress Websites Exposed by Post SMTP Plugin Vulnerability
0 user ratings
2025-07-28 11:02:13
By: milo
Threat Actors Claim Breach of Airpay Payment Gateway
0 user ratings
2025-07-28 10:54:05
By: milo
Women s Dating App Tea Data Leak Exposes 13,000 User Selfies
0 user ratings
2025-07-28 10:38:13
By: milo
Hackers Breach Intelligence Portal Used by the CIA and Other Agencies
0 user ratings
2025-07-28 09:40:16
By: milo
This forum has 298 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.