NCC Group Research Blog
Public Report: Google Private AI Compute Review
5 days 19 hours ago
Bridging the Valley of Death
1 week 5 days ago
Adventures in EM Side-channel Attacks
3 weeks ago
State of the Art of Private Key Security in Blockchain Ops - 4. Approvals and Policies
3 weeks 4 days ago
Azure Fabric Backdoor With A Twist
3 weeks 5 days ago
State of the Art of Private Key Security in Blockchain Ops - 3. Private Key Storage and Signing Module
1 month ago
The Symbols of Operation
1 month ago
State of the Art of Private Key Security in Blockchain Ops - 2. Common Custody Solutions Architectures
1 month 1 week ago
Legacy Technology in Transport: More Than “Old Tech”
1 month 1 week ago
Unmasking Techno Sophists
1 month 1 week ago
Public Report: VetKeys Cryptography Review
1 month 1 week ago
Goal-Based Regulation
1 month 1 week ago
State of the Art of Private Key Security in Blockchain Ops - 1. Concepts, Types of Wallets and Signing Strategies
1 month 2 weeks ago
Your point of departure for forensic readiness
1 month 2 weeks ago
VMware Workstation Guest-to-Host Escape Exploit Development
1 month 2 weeks ago
Voice Impersonation and DeepFake Vishing in Realtime
1 month 2 weeks ago
Technical Advisory: Tesla Telematics Control Unit - ADB Auth Bypass
1 month 2 weeks ago
When Guardrails Aren't Enough: Reinventing Agentic AI Security With Architectural Controls
2 months ago
Public Report: Meta Whatsapp message summarization service
2 months 2 weeks ago
Checked
3 days 7 hours ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed