NCC Group Research Blog
The Importance of a Cryptographic Review
8 months 4 weeks ago
The L4m3ne55 of Passw0rds: Notes from the field
8 months 4 weeks ago
The facts about BadUSB
8 months 4 weeks ago
The Future of C Code Review
8 months 4 weeks ago
The Extended AWS Security Ramp-Up Guide
8 months 4 weeks ago
The factoring dead: Preparing for the cryptopocalypse
8 months 4 weeks ago
The disadvantages of a blacklist-based approach to input validation
8 months 4 weeks ago
The economics of defensive security
8 months 4 weeks ago
The death of USB autorun and the rise of the USB keyboard
8 months 4 weeks ago
The Demise of Signature Based Antivirus
8 months 4 weeks ago
The Database Hacker’s Handbook
8 months 4 weeks ago
The Challenges of Fuzzing 5G Protocols
8 months 4 weeks ago
The CIS Security Standard for Docker available now
8 months 4 weeks ago
The Case of Missing File Extensions
8 months 4 weeks ago
The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems
8 months 4 weeks ago
The Automotive Threat Modeling Template
8 months 4 weeks ago
The Browser Hacker’s Handbook
8 months 4 weeks ago
The 9 Lives of Bleichenbacher’s CAT: New Cache ATtacks on TLS Implementations
8 months 4 weeks ago
The ABCs of NFC chip security
8 months 4 weeks ago
Checked
9 hours 7 minutes ago