NCC Group Research Blog
The facts about BadUSB
1 year 1 month ago
The Future of C Code Review
1 year 1 month ago
The Extended AWS Security Ramp-Up Guide
1 year 1 month ago
The factoring dead: Preparing for the cryptopocalypse
1 year 1 month ago
The disadvantages of a blacklist-based approach to input validation
1 year 1 month ago
The economics of defensive security
1 year 1 month ago
The death of USB autorun and the rise of the USB keyboard
1 year 1 month ago
The Demise of Signature Based Antivirus
1 year 1 month ago
The Database Hacker’s Handbook
1 year 1 month ago
The Challenges of Fuzzing 5G Protocols
1 year 1 month ago
The CIS Security Standard for Docker available now
1 year 1 month ago
The Case of Missing File Extensions
1 year 1 month ago
The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems
1 year 1 month ago
The Automotive Threat Modeling Template
1 year 1 month ago
The Browser Hacker’s Handbook
1 year 1 month ago
The 9 Lives of Bleichenbacher’s CAT: New Cache ATtacks on TLS Implementations
1 year 1 month ago
The ABCs of NFC chip security
1 year 1 month ago
Testing Infrastructure-as-Code Using Dynamic Tooling
1 year 1 month ago
Testing Two-Factor Authentication
1 year 1 month ago
Checked
4 hours 14 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed