NCC Group Research Blog
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
4 months ago
Fuzzbox
4 months ago
FrisbeeLite
4 months ago
From CSV to CMD to qwerty
4 months ago
FPGAs: Security Through Obscurity?
4 months ago
Freddy: An extension for automatically identifying deserialisation issues in Java and .NET applications
4 months ago
Flubot: the evolution of a notorious Android Banking Malware
4 months ago
Forensic Fuzzing Tools
4 months ago
Fix Bounty
4 months ago
Flash local-with-filesystem Bypass in navigateToURL
4 months ago
Flash security restrictions bypass: File upload by URLRequest
4 months ago
firstexecution
4 months ago
Five Essential Machine Learning Security Papers
4 months ago
Finding the weak link in binaries
4 months ago
Firmware Rootkits: The Threat to the Enterprise
4 months ago
File Fuzzers
4 months ago
Finding and Exploiting .NET Remoting over HTTP using Deserialisation
4 months ago
Fat-Finger
4 months ago
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
4 months ago
Checked
6 hours 36 minutes ago