NCC Group Research Blog
Solaris 11 USB hubclass
5 months 2 weeks ago
Software-Based Fault Injection Countermeasures (Part 2/3)
5 months 2 weeks ago
Software Security Austerity Security Debt in Modern Software Development
5 months 2 weeks ago
Software Verification and Analysis Using Z3
5 months 2 weeks ago
Social Engineering
5 months 2 weeks ago
Social Engineering Penetration Testing
5 months 2 weeks ago
Sobelow Update
5 months 2 weeks ago
Sobelow: Static analysis for the Phoenix Framework
5 months 2 weeks ago
SOC maturity & capability
5 months 2 weeks ago
Sniffle: A Sniffer for Bluetooth 5
5 months 2 weeks ago
So long and thanks for all the 0day
5 months 2 weeks ago
Smuggling HTA files in Internet Explorer/Edge
5 months 2 weeks ago
SnapMC skips ransomware, steals data
5 months 2 weeks ago
Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
5 months 2 weeks ago
SmarterMail – Stored XSS in emails
5 months 2 weeks ago
SMB hash hijacking & user tracking in MS Outlook
5 months 2 weeks ago
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
5 months 2 weeks ago
Signaturing an Authenticode anomaly with Yara
5 months 2 weeks ago
Singularity of Origin
5 months 2 weeks ago
Checked
4 hours 30 minutes ago