NCC Group Research Blog
An Adaptive-Ciphertext Attack Against “I ⊕ C” Block Cipher Modes With an Oracle
11 months 1 week ago
Advice for security decision makers contemplating the value of Antivirus
11 months 1 week ago
Advisory-CraigSBlackie-CVE-2016-9795
11 months 1 week ago
Adventures in Xen Exploitation
11 months 1 week ago
Adversarial Machine Learning: Approaches & defences
11 months 1 week ago
Adventures in Windows Driver Development: Part 1
11 months 1 week ago
Advanced SQL Injection in SQL Server Applications
11 months 1 week ago
Adventures in the land of BumbleBee – a new malicious loader
11 months 1 week ago
Adobe Flash Player Cross Domain Policy Bypass
11 months 1 week ago
Adobe flash sandbox bypass to navigate to local drives
11 months 1 week ago
Advanced Exploitation of Oracle PL/SQL Flaws
11 months 1 week ago
Accessing Private Fields Outside of Classes in Java
11 months 1 week ago
Adobe Acrobat Reader XML Forms Data Format Buffer Overflow
11 months 1 week ago
Abusing Blu-ray Players Part 1 – Sandbox Escapes
11 months 1 week ago
Abusing Privileged and Unprivileged Linux Containers
11 months 1 week ago
Absolute Security
11 months 1 week ago
ABSTRACT SHIMMER (CVE-2020-15257): Host Networking is root-Equivalent, Again
11 months 1 week ago
A WarCon 2017 Presentation: Cisco ASA – Exploiting the IKEv1 Heap Overflow – CVE-2016-1287
11 months 1 week ago
“We wait, because we know you.” Inside the ransomware negotiation economics.
11 months 1 week ago
Checked
1 hour 35 minutes ago