NCC Group Research Blog
Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions 2013
11 months 1 week ago
Research Report – Zephyr and MCUboot Security Assessment
11 months 1 week ago
Retro Gaming Vulnerability Research: Warcraft 2
11 months 1 week ago
Return of the hidden number problem
11 months 1 week ago
Research Paper – Recovering deleted data from the Windows registry
11 months 1 week ago
Research Insights Volume 9 – Modern Security Vulnerability Discovery
11 months 1 week ago
Research Paper – Machine Learning for Static Malware Analysis, with University College London
11 months 1 week ago
Research Insights Volume 8 – Hardware Design: FPGA Security Risks
11 months 1 week ago
Research Insights Volume 6: Common Issues with Environment Breakouts
11 months 1 week ago
Research Insights Volume 7: Exploitation Advancements
11 months 1 week ago
Research Insights Volume 4 – Sector Focus: Maritime Sector
11 months 1 week ago
Research Insights Volume 5 – Sector Focus: Automotive
11 months 1 week ago
Research Insights Volume 2 – Defensive Trends
11 months 1 week ago
Research Insights Volume 3 – How are we breaking in: Mobile Security
11 months 1 week ago
Remote Exploitation of Microsoft Office DLL Hijacking (MS15-132) via Browsers
11 months 1 week ago
Replicating CVEs with KLEE
11 months 1 week ago
Research Insights Volume 1 – Sector Focus: Financial Services
11 months 1 week ago
Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121)
11 months 1 week ago
Remote Directory Traversal and File Retrieval
11 months 1 week ago
Checked
1 hour 52 minutes ago