NCC Group Research Blog
Lessons learned from 50 bugs: Common USB driver vulnerabilities
1 year 7 months ago
Lending a hand to the community – Covenant v0.7 Updates
1 year 7 months ago
LDAPFragger: Bypassing network restrictions using LDAP attributes
1 year 7 months ago
LeaPFRogging PFR Implementations
1 year 7 months ago
LAPSUS$: Recent techniques, tactics and procedures
1 year 7 months ago
Latest threats to the connected car & intelligent transport ecosystem
1 year 7 months ago
Launching the first in our series of Research Insights
1 year 7 months ago
Kubernetes Security: Consider Your Threat Model
1 year 7 months ago
lapith
1 year 7 months ago
Kerberos Resource-Based Constrained Delegation: When an Image Change Leads to a Privilege Escalation
1 year 7 months ago
Kivlad
1 year 7 months ago
Java RMI Registry.bind() Unvalidated Deserialization
1 year 7 months ago
Java Web Start File Inclusion via System Properties Override
1 year 7 months ago
Jenkins Plugins and Core Technical Summary Advisory
1 year 7 months ago
Jailbreak, updated and open-sourced
1 year 7 months ago
Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs
1 year 7 months ago
Jackson Deserialization Vulnerabilities
1 year 7 months ago
Jailbreak
1 year 7 months ago
ISM RAT
1 year 7 months ago
Checked
6 hours 6 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed