NCC Group Research Blog
Pairing over BLS12-381, Part 3: Pairing!
4 months ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
4 months ago
Pairing over BLS12-381, Part 1: Fields
4 months ago
Pairing over BLS12-381, Part 2: Curves
4 months ago
Package Play
4 months ago
Padding the struct: How a compiler optimization can disclose stack memory
4 months ago
OSX afpserver remote code execution
4 months ago
Overview of Modern Memory Security Concerns
4 months ago
Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
4 months ago
OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
4 months ago
osquery Application Security Assessment Public Report
4 months ago
Order Details Screens and PII
4 months ago
OS X 10.6.6 Camera Raw Library Memory Corruption
4 months ago
Oracle Retail Integration Bus Manager Directory Traversal
4 months ago
Oracle Retail Invoice Manager SQL Injection
4 months ago
Oracle Hyperion 11 Directory Traversal
4 months ago
Oracle Java Installer Adds a System Path Which is Writable by All
4 months ago
Oracle Passwords and OraBrute
4 months ago
Oracle Forensics Part 7 Using the Oracle System Change Number in Forensic Investigations
4 months ago
Checked
8 hours 35 minutes ago