NCC Group Research Blog
Live Incident Blog: June Global Ransomware Outbreak
11 months ago
Local network compromise despite good patching
11 months ago
log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
11 months ago
libtalloc: A GDB plugin for analysing the talloc heap
11 months ago
Lights, Camera, HACKED! An insight into the world of popular IP Cameras
11 months ago
Lessons learned from 50 USB bugs
11 months ago
LibAVCodec AMV Out of Array Write
11 months ago
Lessons learned from 50 bugs: Common USB driver vulnerabilities
11 months ago
Lending a hand to the community – Covenant v0.7 Updates
11 months ago
LDAPFragger: Bypassing network restrictions using LDAP attributes
11 months ago
LeaPFRogging PFR Implementations
11 months ago
LAPSUS$: Recent techniques, tactics and procedures
11 months ago
Latest threats to the connected car & intelligent transport ecosystem
11 months ago
Launching the first in our series of Research Insights
11 months ago
Kubernetes Security: Consider Your Threat Model
11 months ago
lapith
11 months ago
Kerberos Resource-Based Constrained Delegation: When an Image Change Leads to a Privilege Escalation
11 months ago
Kivlad
11 months ago
Java RMI Registry.bind() Unvalidated Deserialization
11 months ago
Checked
1 hour 23 minutes ago