NCC Group Research Blog
Accessing Private Fields Outside of Classes in Java
1 year 1 month ago
Adobe Acrobat Reader XML Forms Data Format Buffer Overflow
1 year 1 month ago
Abusing Blu-ray Players Part 1 – Sandbox Escapes
1 year 1 month ago
Abusing Privileged and Unprivileged Linux Containers
1 year 1 month ago
Absolute Security
1 year 1 month ago
ABSTRACT SHIMMER (CVE-2020-15257): Host Networking is root-Equivalent, Again
1 year 1 month ago
A WarCon 2017 Presentation: Cisco ASA – Exploiting the IKEv1 Heap Overflow – CVE-2016-1287
1 year 1 month ago
“We wait, because we know you.” Inside the ransomware negotiation economics.
1 year 1 month ago
A Survey of Istio’s Network Security Features
1 year 1 month ago
A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM
1 year 1 month ago
A Simple and Practical Approach to Input Validation
1 year 1 month ago
A Peek Behind the Great Firewall of Russia
1 year 1 month ago
A Primer On Slowable Encoders
1 year 1 month ago
A jq255 Elliptic Curve Specification, and a Retrospective
1 year 1 month ago
A Look At Some Real-World Obfuscation Techniques
1 year 1 month ago
A New Flying Kitten?
1 year 1 month ago
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
1 year 1 month ago
A Guide to Improving Security Through Infrastructure-as-Code
1 year 1 month ago
A deeper dive into CVE-2021-39137 – a Golang security bug that Rust would have prevented
1 year 1 month ago
Checked
3 hours 27 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed