National Cyber Warfare Foundation (NCWF)

Red Team (CNA) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
New CastleLoader Attack Uses Cloudflare-Themed Clickfix Method to Compromise Windows Systems
0 user ratings
2025-07-25 08:30:07
By: milo
New VoIP Botnet Targets Routers Using Default Passwords
0 user ratings
2025-07-25 08:30:07
By: milo
Multiple Hacker Groups Exploit SharePoint 0-Day Vulnerability in the Wild
0 user ratings
2025-07-25 08:03:04
By: milo
Bulletproof Host Aeza Group Moves Infrastructure to New Autonomous System
0 user ratings
2025-07-25 05:41:11
By: milo
Hackers Inject Destructive Commands into Amazon s AI Coding Agent
0 user ratings
2025-07-25 05:32:23
By: milo
BlackSuit Ransomware Infrastructure Seized by Authorities
0 user ratings
2025-07-25 05:32:23
By: milo
evilreplay – Real-Time Browser Session Hijack Without Cookie Theft
0 user ratings
2025-07-25 02:10:20
By: milo
Quid Miner Launches Mobile Cloud Mining App for Seamless, Secure BTC and DOGE Cryptocurrency Daily Income of $17,777
0 user ratings
2025-07-25 01:36:24
By: milo
AI-Powered Cyber Attacks Utilize ML Algorithms to Deploy Malware and Circumvent Traditional Security
0 user ratings
2025-07-24 19:35:14
By: milo
Hive0156 Hackers Targeting Government and Military Organizations to Deploy REMCOS RAT
0 user ratings
2025-07-24 19:02:48
By: milo
Surge in Phishing Attacks Exploiting Spoofed SharePoint Domains and Sneaky 2FA Tactics
0 user ratings
2025-07-24 18:38:25
By: milo
APT28 Hackers Unveil First LLM-Powered Malware, Enhancing Attack Techniques with AI
0 user ratings
2025-07-24 18:14:13
By: milo
A Premium Luggage Service s Web Bugs Exposed the Travel Plans of Every User Including Diplomats
0 user ratings
2025-07-24 16:39:42
By: milo
NoName057(16) Hackers Target 3,700 Unique Devices Over the Last 13 Months
0 user ratings
2025-07-24 15:35:16
By: milo
Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms
0 user ratings
2025-07-24 15:35:15
By: milo
Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector
0 user ratings
2025-07-24 15:35:15
By: milo
UNC3944 Exploits VMware vSphere to Deploy Ransomware and Steal Data from Organizations
0 user ratings
2025-07-24 13:18:20
By: milo
Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability
0 user ratings
2025-07-24 12:54:15
By: milo
Who is Fancy Bear (APT28) and What Do They Do?
0 user ratings
2025-07-24 12:35:10
By: milo
Researchers Exploit Cursor Background Agents to Take Over Amazon EC2 Instance
0 user ratings
2025-07-24 10:37:22
By: milo
AI-Driven Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy
0 user ratings
2025-07-24 09:58:25
By: milo
Chinese Hackers Launch Targeted Campaign to Infect Windows Systems with Ghost RAT and PhantomNet Malware
0 user ratings
2025-07-24 09:34:14
By: milo
Google Introduces OSS Rebuild to Boost Security in Open-Source Package Ecosystems
0 user ratings
2025-07-24 09:01:50
By: milo
Metasploit Module Released to Exploit SharePoint 0-Day Vulnerabilities
0 user ratings
2025-07-24 08:01:44
By: milo
TP-Link Network Video Recorder Vulnerability Enables Arbitrary Command Execution
0 user ratings
2025-07-24 07:46:51
By: milo
This forum has 298 pages of posts.
 
all forums
new post



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.