NCC Group Research Blog
Do not use your AWS root account
4 months ago
Does TypeScript Offer Security Improvements Over JavaScript?
4 months ago
Distributed Ledger (Blockchain) Security and Quantum Computing Implications
4 months ago
DNS Pinning and Web Proxies
4 months ago
Disclosure Policy
4 months ago
Discovering Smart Contract Vulnerabilities with GOATCasino
4 months ago
Dissecting social engineering attacks
4 months ago
DIBF – Updated
4 months ago
Disabling Office Macros to Reduce Malware Infections
4 months ago
Developing Secure Mobile Applications for Android
4 months ago
Detection Engineering for Kubernetes clusters
4 months ago
Detecting Mimikatz with Busylight
4 months ago
Detecting Rclone – An Effective Tool for Exfiltration
4 months ago
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
4 months ago
Detecting Karakurt – an extortion focused threat actor
4 months ago
Detecting and Hunting for the PetitPotam NTLM Relay Attack
4 months ago
Detecting and Protecting when Remote Desktop Protocol (RDP) is open to the Internet
4 months ago
Detecting anomalous Vectored Exception Handlers on Windows
4 months ago
Derusbi: A Case Study in Rapid Capability Development
4 months ago
Checked
2 hours 20 minutes ago