NCC Group Research Blog
Sifting through the spines: identifying (potential) Cactus ransomware victims
10 months ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
10 months ago
Shocker
10 months ago
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
10 months ago
SIAM AG23: Algebraic Geometry with Friends
10 months ago
Shining the Light on Black Basta
10 months ago
Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
10 months ago
Shell Arithmetic Expansion and Evaluation Abuse
10 months ago
Shellshock Advisory
10 months ago
Shellshock Bash Vulnerability
10 months ago
Sharkbot is back in Google Play
10 months ago
SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store
10 months ago
Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark
10 months ago
Setting a New Standard for Kubernetes Deployments
10 months ago
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
10 months ago
Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond
10 months ago
Self-Driving Cars- The future is now…
10 months ago
Security impact of IoT on the Enterprise
10 months ago
Security of Things: An Implementer’s Guide to Cyber Security for Internet of Things Devices and Beyond
10 months ago
Checked
7 hours 10 minutes ago