NCC Group Research Blog
A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM
11 months 1 week ago
A Simple and Practical Approach to Input Validation
11 months 1 week ago
A Peek Behind the Great Firewall of Russia
11 months 1 week ago
A Primer On Slowable Encoders
11 months 1 week ago
A jq255 Elliptic Curve Specification, and a Retrospective
11 months 1 week ago
A Look At Some Real-World Obfuscation Techniques
11 months 1 week ago
A New Flying Kitten?
11 months 1 week ago
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
11 months 1 week ago
A Guide to Improving Security Through Infrastructure-as-Code
11 months 1 week ago
A deeper dive into CVE-2021-39137 – a Golang security bug that Rust would have prevented
11 months 1 week ago
A few notes on usefully exploiting libstagefright on Android 5.x
11 months 1 week ago
A Brief Review of Bitcoin Locking Scripts and Ordinals
11 months 1 week ago
A Census of Deployed Pulse Connect Secure (PCS) Versions
11 months 1 week ago
A Back-to-Front TrueCrypt Recovery Story: The Plaintext is the Ciphertext
11 months 1 week ago
A brief look at Windows telemetry: CIT aka Customer Interaction Tracker
11 months 1 week ago
44Con2013Game
11 months 1 week ago
5G security – how to minimise the threats to a 5G network
11 months 1 week ago
10 real-world stories of how we’ve compromised CI/CD pipelines
11 months 1 week ago
44CON Workshop – How to assess and secure iOS apps
11 months 1 week ago
Checked
7 hours 4 minutes ago