NCC Group Research Blog
An Introduction to Ultrasound Security Research
1 year 1 month ago
An Introduction to Fault Injection (Part 1/3)
1 year 1 month ago
An Introduction to Heap overflows on AIX 5.3L
1 year 1 month ago
An Analysis of Mobile Geofencing App Security
1 year 1 month ago
An Illustrated Guide to Elliptic Curve Cryptography Validation
1 year 1 month ago
An Introduction to Authenticated Encryption
1 year 1 month ago
An Adventure in Contingency Debugging: Ruby IO#read/IO#write Considered Harmful
1 year 1 month ago
An adventure in PoEKmon NeutriGo land
1 year 1 month ago
Alternative Approaches for Fault Injection Countermeasures (Part 3/3)
1 year 1 month ago
An Adaptive-Ciphertext Attack Against “I ⊕ C” Block Cipher Modes With an Oracle
1 year 1 month ago
Advice for security decision makers contemplating the value of Antivirus
1 year 1 month ago
Advisory-CraigSBlackie-CVE-2016-9795
1 year 1 month ago
Adventures in Xen Exploitation
1 year 1 month ago
Adversarial Machine Learning: Approaches & defences
1 year 1 month ago
Adventures in Windows Driver Development: Part 1
1 year 1 month ago
Advanced SQL Injection in SQL Server Applications
1 year 1 month ago
Adventures in the land of BumbleBee – a new malicious loader
1 year 1 month ago
Adobe Flash Player Cross Domain Policy Bypass
1 year 1 month ago
Adobe flash sandbox bypass to navigate to local drives
1 year 1 month ago
Checked
1 hour 50 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed