NCC Group Research Blog
Developing Secure Mobile Applications for Android
5 months 3 weeks ago
Detection Engineering for Kubernetes clusters
5 months 3 weeks ago
Detecting Mimikatz with Busylight
5 months 3 weeks ago
Detecting Rclone – An Effective Tool for Exfiltration
5 months 3 weeks ago
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
5 months 3 weeks ago
Detecting Karakurt – an extortion focused threat actor
5 months 3 weeks ago
Detecting and Hunting for the PetitPotam NTLM Relay Attack
5 months 3 weeks ago
Detecting and Protecting when Remote Desktop Protocol (RDP) is open to the Internet
5 months 3 weeks ago
Detecting anomalous Vectored Exception Handlers on Windows
5 months 3 weeks ago
Derusbi: A Case Study in Rapid Capability Development
5 months 3 weeks ago
Detecting and Hunting for the Malicious NetFilter Driver
5 months 3 weeks ago
Demystifying Multivariate Cryptography
5 months 3 weeks ago
Denial of Service in Parsing a URL by ierutil.dll
5 months 3 weeks ago
Demystifying Cobalt Strike’s “make_token” Command
5 months 3 weeks ago
Demystifying AWS’ AssumeRole and sts:ExternalId
5 months 3 weeks ago
Defeating Windows DEP With A Custom ROP Chain
5 months 3 weeks ago
DeLux Edition: Getting root privileges on the eLux Thin Client OS
5 months 3 weeks ago
Deep Dive into Real-World Kubernetes Threats
5 months 3 weeks ago
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server
5 months 3 weeks ago
Checked
6 hours 30 minutes ago