NCC Group Research Blog
Cisco ASA series part one: Intro to the Cisco ASA
11 months 1 week ago
Cisco ASA series part eight: Exploiting the CVE-2016-1287 heap overflow over IKEv1
11 months 1 week ago
Cisco ASA series part five: libptmalloc gdb plugin
11 months 1 week ago
Check out our new Microcorruption challenges!
11 months 1 week ago
Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
11 months 1 week ago
Chrome Password Manager Cross Origin Weakness
11 months 1 week ago
CertPortal: Building Self-Service Secure S/MIME Provisioning Portal
11 months 1 week ago
Chafer backdoor analysis
11 months 1 week ago
CERT C Secure Coding Standard
11 months 1 week ago
CERT Oracle Secure Coding Standard for Java
11 months 1 week ago
CECSTeR
11 months 1 week ago
Celebrating NCC Con Europe 2018
11 months 1 week ago
Call Map: A Tool for Navigating Call Graphs in Python
11 months 1 week ago
Car Parking Apps Vulnerable To Hacks
11 months 1 week ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
11 months 1 week ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
11 months 1 week ago
Bypassing Android’s Network Security Configuration
11 months 1 week ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
11 months 1 week ago
Building WiMap the Wi-Fi Mapping Drone (1)
11 months 1 week ago
Checked
50 minutes 27 seconds ago