NCC Group Research Blog
Threats and vulnerabilities within the Maritime and shipping sectors
5 months 2 weeks ago
Threat Intelligence: Benefits for the Enterprise
5 months 2 weeks ago
Threat Modelling Cloud Platform Services by Example: Google Cloud Storage
5 months 2 weeks ago
Threat Profiling Microsoft SQL Server
5 months 2 weeks ago
Third party assurance
5 months 2 weeks ago
Threat Actors: exploiting the pandemic
5 months 2 weeks ago
There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
5 months 2 weeks ago
They Ought to Know Better: Exploiting Security Gateways via their Web Interfaces
5 months 2 weeks ago
Thin Clients: Slim Security
5 months 2 weeks ago
The why behind web application penetration test prerequisites
5 months 2 weeks ago
There’s A Hole In Your SoC: Glitching The MediaTek BootROM
5 months 2 weeks ago
The SSL Conservatory
5 months 2 weeks ago
The Update Framework (TUF) Security Assessment
5 months 2 weeks ago
The Sorry State of Aftermarket Head Unit Security
5 months 2 weeks ago
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
5 months 2 weeks ago
The role of security research in improving cyber security
5 months 2 weeks ago
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
5 months 2 weeks ago
The Pentesters Guide to Akamai
5 months 2 weeks ago
The Pharming Guide – Understanding and preventing DNS related attacks by phishers
5 months 2 weeks ago
Checked
5 hours 4 minutes ago