National Cyber Warfare Foundation (NCWF)

Red Team (CNA)

This area is only showing posts newer than 3 months. You can find older articles in the archive area of this forum.

Posts
Ratingnew post
Apple 0-Day Flaw Actively Exploited in Targeted Cyberattacks on Individuals
0 user ratings
2026-02-12 04:56:27
By: milo
Bugcrowd Showcases Team-Based Hacking Approach to Enhance Security Testing - TipRanks
0 user ratings
2026-02-12 00:42:54
By: milo
Linux: Zapper – How Hackers Hide Malicious Process
0 user ratings
2026-02-11 15:48:20
By: milo
Microsoft Launches Extended Security Update Program for Windows 10 Users
0 user ratings
2026-02-11 13:05:29
By: milo
VoidLink Framework Introduces On-Demand Tool Generation with Native Windows Plugin Support
0 user ratings
2026-02-11 12:35:28
By: milo
MSHTML Framework Zero-Day Opens Door to Network-Based Security Bypass
0 user ratings
2026-02-11 12:35:28
By: milo
Microsoft Office Word 0-Day Vulnerability Enables Attackers to Bypass Security Feature
0 user ratings
2026-02-11 11:55:29
By: milo
Desktop Window Manager Zero-Day Enables Privilege Escalation
0 user ratings
2026-02-11 11:25:29
By: milo
GTIG Warns of Rising Espionage and Supply Chain Cyber Threats Targeting Defense Sector
0 user ratings
2026-02-11 11:15:28
By: milo
RU-APT-ChainReaver-L Hijacks Trusted Sites and GitHub in Sweeping Cross-Platform Supply Chain Attack
0 user ratings
2026-02-11 09:44:28
By: milo
Ivanti Endpoint Manager Flaw Enables Remote Data Exposure
0 user ratings
2026-02-11 09:14:28
By: milo
Windows Remote Access Connection Manager Zero-Day Enables DoS Attacks
0 user ratings
2026-02-11 07:24:29
By: milo
Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication
0 user ratings
2026-02-11 07:24:28
By: milo
Hackers Exploit ChatGPT, Grok and Google Ads to Spread macOS AMOS Stealer
0 user ratings
2026-02-11 07:24:28
By: milo
Legacy IRC Botnet Leverages Automated SSH Exploit Pipeline to Mass-Enroll Linux Hosts
0 user ratings
2026-02-11 07:04:28
By: milo
Cephalus Ransomware Emerges as Go-Based Double-Extortion Threat Exploiting Exposed RDP Access
0 user ratings
2026-02-11 06:34:28
By: milo
FortiOS Vulnerability Enables LDAP Authentication Bypass
0 user ratings
2026-02-11 06:34:27
By: milo
GitLab Patches Multiple Vulnerabilities Enabling DoS and Cross-Site Scripting Attacks
0 user ratings
2026-02-11 05:24:28
By: milo
Coinbase Cartel Shifts to Data-Theft-First Tactics, Targeting High-Value Industries
0 user ratings
2026-02-11 05:04:28
By: milo
Microsoft Patch Tuesday February 2026 Fixes 54 Flaws, 6 Zero-Days Under Active Exploitation
0 user ratings
2026-02-11 04:54:28
By: milo
Patch Tuesday - February 2026
0 user ratings
2026-02-11 02:20:12
By: milo
Tech Oversight Project: ahead of a landmark social media addiction trial, Meta paid for 3,500+ ads on CNN, Fox, and others to promote Instagram's
0 user ratings
2026-02-10 19:20:10
By: milo
Measuring AI Security: Separating Signal from Panic
0 user ratings
2026-02-10 18:19:11
By: milo
Long Range Acoustic Device (LRAD), Part 2: Tactics and Countermeasures
0 user ratings
2026-02-10 14:51:22
By: milo
Hackers Weaponize 7-Zip Downloads to Turn Home PCs Into Proxy Nodes
0 user ratings
2026-02-10 13:49:26
By: milo
This forum has 58 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.