NCC Group Research Blog
Smuggling HTA files in Internet Explorer/Edge
4 months ago
SnapMC skips ransomware, steals data
4 months ago
Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
4 months ago
SmarterMail – Stored XSS in emails
4 months ago
SMB hash hijacking & user tracking in MS Outlook
4 months ago
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
4 months ago
Signaturing an Authenticode anomaly with Yara
4 months ago
Singularity of Origin
4 months ago
Slotting Security into Corporate Development
4 months ago
Sifting through the spines: identifying (potential) Cactus ransomware victims
4 months ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
4 months ago
Shocker
4 months ago
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
4 months ago
SIAM AG23: Algebraic Geometry with Friends
4 months ago
Shining the Light on Black Basta
4 months ago
Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
4 months ago
Shell Arithmetic Expansion and Evaluation Abuse
4 months ago
Shellshock Advisory
4 months ago
Shellshock Bash Vulnerability
4 months ago
Checked
6 hours 32 minutes ago