NCC Group Research Blog
Celebrating NCC Con Europe 2018
1 year 1 month ago
Call Map: A Tool for Navigating Call Graphs in Python
1 year 1 month ago
Car Parking Apps Vulnerable To Hacks
1 year 1 month ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
1 year 1 month ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
1 year 1 month ago
Bypassing Android’s Network Security Configuration
1 year 1 month ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
1 year 1 month ago
Building WiMap the Wi-Fi Mapping Drone (1)
1 year 1 month ago
Business Insights: Cyber Security in the Financial Sector
1 year 1 month ago
Building Security In: Software Penetration Testing
1 year 1 month ago
Building Systems from Commercial Components
1 year 1 month ago
Building WiMap the Wi-Fi Mapping Drone
1 year 1 month ago
Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures
1 year 1 month ago
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
1 year 1 month ago
Build Your Own Wi-Fi Mapping Drone Capability
1 year 1 month ago
Building an RDP Credential Catcher for Threat Intelligence
1 year 1 month ago
Browser Extension Password Managers
1 year 1 month ago
Buffer Underruns, DEP, ASLR and improving the Exploitation Prevention Mechanisms (XPMs) on the Windows platform
1 year 1 month ago
Broadcasting your attack – DAB security
1 year 1 month ago
Checked
22 minutes 7 seconds ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed