NCC Group Research Blog
Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing
4 months ago
Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin
4 months ago
Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism
4 months ago
Oracle Forensics Part 4: Live Response
4 months ago
Oracle Forensics Part 1: Dissecting the Redo Logs
4 months ago
Oracle Forensics Part 2: Locating Dropped Objects
4 months ago
Oracle 11g TNS listener remote Null Pointer Dereference
4 months ago
Oracle E-Business Suite Pre-Auth SQLi with DBA Privileges
4 months ago
Oracle 11g TNS listener remote Invalid Pointer Read
4 months ago
Optimizing Pairing-Based Cryptography: Montgomery Multiplication in Assembly
4 months ago
Optimum Routers: Researching Managed Routers
4 months ago
Open Banking: Security considerations & potential risks
4 months ago
Optimizing Pairing-Based Cryptography: Montgomery Arithmetic in Rust
4 months ago
On the Use of Pedersen Commitments for Confidential Payments
4 months ago
Online Casino Roulette – A guideline for penetration testers and security researchers
4 months ago
On Linux’s Random Number Generation
4 months ago
On Multiplications with Unsaturated Limbs
4 months ago
On the malicious use of large language models like GPT-3
4 months ago
NX Server for Linux Arbitrary Files can be read with root privileges
4 months ago
Checked
1 hour 42 minutes ago