NCC Group Research Blog
Absolute Security
4 months ago
ABSTRACT SHIMMER (CVE-2020-15257): Host Networking is root-Equivalent, Again
4 months ago
A WarCon 2017 Presentation: Cisco ASA – Exploiting the IKEv1 Heap Overflow – CVE-2016-1287
4 months ago
“We wait, because we know you.” Inside the ransomware negotiation economics.
4 months ago
A Survey of Istio’s Network Security Features
4 months ago
A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM
4 months ago
A Simple and Practical Approach to Input Validation
4 months ago
A Peek Behind the Great Firewall of Russia
4 months ago
A Primer On Slowable Encoders
4 months ago
A jq255 Elliptic Curve Specification, and a Retrospective
4 months ago
A Look At Some Real-World Obfuscation Techniques
4 months ago
A New Flying Kitten?
4 months ago
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
4 months ago
A Guide to Improving Security Through Infrastructure-as-Code
4 months ago
A deeper dive into CVE-2021-39137 – a Golang security bug that Rust would have prevented
4 months ago
A few notes on usefully exploiting libstagefright on Android 5.x
4 months ago
A Brief Review of Bitcoin Locking Scripts and Ordinals
4 months ago
A Census of Deployed Pulse Connect Secure (PCS) Versions
4 months ago
A Back-to-Front TrueCrypt Recovery Story: The Plaintext is the Ciphertext
4 months ago
Checked
9 hours 29 minutes ago