NCC Group Research Blog
Solaris 11 USB hubclass
10 months ago
Software-Based Fault Injection Countermeasures (Part 2/3)
10 months ago
Software Security Austerity Security Debt in Modern Software Development
10 months ago
Software Verification and Analysis Using Z3
10 months ago
Social Engineering
10 months ago
Social Engineering Penetration Testing
10 months ago
Sobelow Update
10 months ago
Sobelow: Static analysis for the Phoenix Framework
10 months ago
SOC maturity & capability
10 months ago
Sniffle: A Sniffer for Bluetooth 5
10 months ago
So long and thanks for all the 0day
10 months ago
Smuggling HTA files in Internet Explorer/Edge
10 months ago
SnapMC skips ransomware, steals data
10 months ago
Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
10 months ago
SmarterMail – Stored XSS in emails
10 months ago
SMB hash hijacking & user tracking in MS Outlook
10 months ago
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
10 months ago
Signaturing an Authenticode anomaly with Yara
10 months ago
Singularity of Origin
10 months ago
Checked
6 hours 12 minutes ago