NCC Group Research Blog
EternalGlue part one: Rebuilding NotPetya to assess real-world resilience
5 months 3 weeks ago
Ethics in Security Testing
5 months 3 weeks ago
Enumerating System Management Interrupts
5 months 3 weeks ago
Erlang Security 101
5 months 3 weeks ago
Estimating the Bit Security of Pairing-Friendly Curves
5 months 3 weeks ago
Enterprise-scale seamless onboarding and deployment of Azure Sentinel using Lighthouse for multi-tenant environments
5 months 3 weeks ago
Endpoint connectivity
5 months 3 weeks ago
Encryption at rest: Not the panacea to data protection
5 months 3 weeks ago
Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm
5 months 3 weeks ago
End-of-life pragmatism
5 months 3 weeks ago
Embedded Device Security Certifications
5 months 3 weeks ago
Emissary Panda – A potential new malicious tool
5 months 3 weeks ago
EDIDFuzzer
5 months 3 weeks ago
Elephant in the Boardroom Survey 2016
5 months 3 weeks ago
eBook: Breach notification under GDPR – How to communicate a personal data breach
5 months 3 weeks ago
eBPF Adventures: Fiddling with the Linux Kernel and Unix Domain Sockets
5 months 3 weeks ago
eBook – Planning a robust incident response process
5 months 3 weeks ago
eBook – Do you know how your organisation would react in a real-world attack scenario?
5 months 3 weeks ago
easyda
5 months 3 weeks ago
Checked
6 hours 33 minutes ago