NCC Group Research Blog
Detecting and Protecting when Remote Desktop Protocol (RDP) is open to the Internet
1 year 1 month ago
Detecting anomalous Vectored Exception Handlers on Windows
1 year 1 month ago
Derusbi: A Case Study in Rapid Capability Development
1 year 1 month ago
Detecting and Hunting for the Malicious NetFilter Driver
1 year 1 month ago
Demystifying Multivariate Cryptography
1 year 1 month ago
Denial of Service in Parsing a URL by ierutil.dll
1 year 1 month ago
Demystifying Cobalt Strike’s “make_token” Command
1 year 1 month ago
Demystifying AWS’ AssumeRole and sts:ExternalId
1 year 1 month ago
Defeating Windows DEP With A Custom ROP Chain
1 year 1 month ago
DeLux Edition: Getting root privileges on the eLux Thin Client OS
1 year 1 month ago
Deep Dive into Real-World Kubernetes Threats
1 year 1 month ago
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server
1 year 1 month ago
Decoding network data from a Gh0st RAT variant
1 year 1 month ago
Decrypting OpenSSH sessions for fun and profit
1 year 1 month ago
DECTbeacon
1 year 1 month ago
Decoder Improved Burp Suite Plugin
1 year 1 month ago
Decoder Improved Burp Suite plugin release part one
1 year 1 month ago
Decoder Improved Burp Suite plugin release part two
1 year 1 month ago
Deception Engineering: exploring the use of Windows Service Canaries against ransomware
1 year 1 month ago
Checked
4 hours 22 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed