NCC Group Research Blog
Research Paper – Recovering deleted data from the Windows registry
5 months 2 weeks ago
Research Insights Volume 9 – Modern Security Vulnerability Discovery
5 months 2 weeks ago
Research Paper – Machine Learning for Static Malware Analysis, with University College London
5 months 2 weeks ago
Research Insights Volume 8 – Hardware Design: FPGA Security Risks
5 months 2 weeks ago
Research Insights Volume 6: Common Issues with Environment Breakouts
5 months 2 weeks ago
Research Insights Volume 7: Exploitation Advancements
5 months 2 weeks ago
Research Insights Volume 4 – Sector Focus: Maritime Sector
5 months 2 weeks ago
Research Insights Volume 5 – Sector Focus: Automotive
5 months 2 weeks ago
Research Insights Volume 2 – Defensive Trends
5 months 2 weeks ago
Research Insights Volume 3 – How are we breaking in: Mobile Security
5 months 2 weeks ago
Remote Exploitation of Microsoft Office DLL Hijacking (MS15-132) via Browsers
5 months 2 weeks ago
Replicating CVEs with KLEE
5 months 2 weeks ago
Research Insights Volume 1 – Sector Focus: Financial Services
5 months 2 weeks ago
Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121)
5 months 2 weeks ago
Remote Directory Traversal and File Retrieval
5 months 2 weeks ago
Real World Cryptography Conference 2024
5 months 2 weeks ago
Remote code execution in ImpressPages CMS
5 months 2 weeks ago
Real World Cryptography Conference 2023 – Part I
5 months 2 weeks ago
Real World Cryptography Conference 2023 – Part II
5 months 2 weeks ago
Checked
10 hours 7 minutes ago