NCC Group Research Blog
Visualising Firewall Rulesets – Simplifying Firewall Administration and Spotting the Pivot Point
10 months 1 week ago
Vehicle Emissions and Cyber Security
10 months 1 week ago
Violating Database – Enforced Security Mechanisms
10 months 1 week ago
Violating the Virtual Channel – RDP Testing
10 months 1 week ago
Variations in Exploit methods between Linux and Windows
10 months 1 week ago
Using SharePoint as a Phishing Platform
10 months 1 week ago
Vaccine Misinformation Part 1: Misinformation Attacks as a Cyber Kill Chain
10 months 1 week ago
Using AWS and Azure for Cost Effective Log Ingestion with Data Processing Pipelines for SIEMs
10 months 1 week ago
Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things
10 months 1 week ago
Using Semgrep with Jupyter Notebook files
10 months 1 week ago
Use of Deserialisation in .NET Framework Methods and Classes
10 months 1 week ago
Username enumeration techniques and their value
10 months 1 week ago
USB Undermining Security Barriers:further adventures with USB
10 months 1 week ago
Use and enforce Multi-Factor Authentication
10 months 1 week ago
USB keyboards by post – use of embedded keystroke injectors to bypass autorun restrictions on modern desktop operating systems
10 months 1 week ago
USB under the bonnet: Implications of USB security vulnerabilities in vehicle systems
10 months 1 week ago
Updated: Technical Advisory and Proofs of Concept – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)
10 months 1 week ago
USB attacks need physical access right? Not any more…
10 months 1 week ago
Unmasking Lorenz Ransomware: A Dive into Recent Tactics, Techniques and Procedures
10 months 1 week ago
Checked
1 hour 31 minutes ago