NCC Group Research Blog
Mallory: Transparent TCP and UDP Proxy
5 months 2 weeks ago
Man-in-the-Middling Non-Proxy Aware Wi-Fi Devices with a Pineapple
5 months 2 weeks ago
Machine learning from idea to reality: a PowerShell case study
5 months 2 weeks ago
Making New Connections – Leveraging Cisco AnyConnect Client to Drop and Run Payloads
5 months 2 weeks ago
Machine Learning 104: Breaking AES With Power Side-Channels
5 months 2 weeks ago
Machine Learning for Static Analysis of Malware – Expansion of Research Scope
5 months 2 weeks ago
Machine Learning 103: Exploring LLM Code Generation
5 months 2 weeks ago
Lumension Device Control Remote Memory Corruption
5 months 2 weeks ago
Machine Learning 101: The Integrity of Image (Mis)Classification?
5 months 2 weeks ago
Machine Learning 102: Attacking Facial Authentication with Poisoned Data
5 months 2 weeks ago
LTair: The LTE Air Interface Tool
5 months 2 weeks ago
Lumension Device Control (formerly Sanctuary) remote memory corruption
5 months 2 weeks ago
Login Service Security
5 months 2 weeks ago
Logs, Logs, the Audit Trail – Features of a Successful Log Management Solution
5 months 2 weeks ago
Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel
5 months 2 weeks ago
Log4Shell: Reconnaissance and post exploitation network detection
5 months 2 weeks ago
Live Incident Blog: June Global Ransomware Outbreak
5 months 2 weeks ago
Local network compromise despite good patching
5 months 2 weeks ago
log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
5 months 2 weeks ago
Checked
10 hours 18 minutes ago