NCC Group Research Blog
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
6 months ago
Build Your Own Wi-Fi Mapping Drone Capability
6 months ago
Building an RDP Credential Catcher for Threat Intelligence
6 months ago
Browser Extension Password Managers
6 months ago
Buffer Underruns, DEP, ASLR and improving the Exploitation Prevention Mechanisms (XPMs) on the Windows platform
6 months ago
Broadcasting your attack – DAB security
6 months ago
BrokenPrint: A Netgear stack overflow
6 months ago
Blue Coat BCAAA Remote Code Execution Vulnerability
6 months ago
Breaking into Security Research at NCC Group
6 months ago
Breaking Pedersen Hashes in Practice
6 months ago
Blind Security Testing – An Evolutionary Approach
6 months ago
Blind Return Oriented Programming
6 months ago
BLEBoy
6 months ago
Blind Exploitation of Stack Overflow Vulnerabilities
6 months ago
BlackBerry PlayBook Security – Part Two – BlackBerry Bridge
6 months ago
Blackbox iOS App Assessments Using idb
6 months ago
BlackHat Asia USB Physical Access
6 months ago
BlackBerry Link WebDav Server Bound to the BlackBerry VPN Adapter
6 months ago
BlackBerry PlayBook Security – Part One
6 months ago
Checked
38 minutes 35 seconds ago