NCC Group Research Blog
Exploiting CVE-2015-2426, and How I Ported it to a Recent Windows 8.1 64-bit
4 months ago
Exploiting MS15-061 Use-After-Free Windows Kernel Vulnerability
4 months ago
Exploiting CVE-2014-0282
4 months ago
Exploiting CVE-2014-0282 (1)
4 months ago
Experiments in Extending Thinkst Canary – Part 1
4 months ago
Exploit mitigations: keeping up with evolving and complex software/hardware
4 months ago
Exploit the Fuzz – Exploiting Vulnerabilities in 5G Core Networks
4 months ago
Eurocrypt 2023: Death of a KEM
4 months ago
Exception Handling and Data Integrity in Salesforce
4 months ago
EternalGlue part one: Rebuilding NotPetya to assess real-world resilience
4 months ago
Ethics in Security Testing
4 months ago
Enumerating System Management Interrupts
4 months ago
Erlang Security 101
4 months ago
Estimating the Bit Security of Pairing-Friendly Curves
4 months ago
Enterprise-scale seamless onboarding and deployment of Azure Sentinel using Lighthouse for multi-tenant environments
4 months ago
Endpoint connectivity
4 months ago
Encryption at rest: Not the panacea to data protection
4 months ago
Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm
4 months ago
End-of-life pragmatism
4 months ago
Checked
5 hours 37 minutes ago