NCC Group Research Blog
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
5 months 2 weeks ago
Build Your Own Wi-Fi Mapping Drone Capability
5 months 2 weeks ago
Building an RDP Credential Catcher for Threat Intelligence
5 months 2 weeks ago
Browser Extension Password Managers
5 months 2 weeks ago
Buffer Underruns, DEP, ASLR and improving the Exploitation Prevention Mechanisms (XPMs) on the Windows platform
5 months 2 weeks ago
Broadcasting your attack – DAB security
5 months 2 weeks ago
BrokenPrint: A Netgear stack overflow
5 months 2 weeks ago
Blue Coat BCAAA Remote Code Execution Vulnerability
5 months 2 weeks ago
Breaking into Security Research at NCC Group
5 months 2 weeks ago
Breaking Pedersen Hashes in Practice
5 months 2 weeks ago
Blind Security Testing – An Evolutionary Approach
5 months 2 weeks ago
Blind Return Oriented Programming
5 months 2 weeks ago
BLEBoy
5 months 2 weeks ago
Blind Exploitation of Stack Overflow Vulnerabilities
5 months 2 weeks ago
BlackBerry PlayBook Security – Part Two – BlackBerry Bridge
5 months 2 weeks ago
Blackbox iOS App Assessments Using idb
5 months 2 weeks ago
BlackHat Asia USB Physical Access
5 months 2 weeks ago
BlackBerry Link WebDav Server Bound to the BlackBerry VPN Adapter
5 months 2 weeks ago
BlackBerry PlayBook Security – Part One
5 months 2 weeks ago
Checked
10 hours 39 minutes ago