NCC Group Research Blog
DDoS Common Approaches and Failings
1 year 1 month ago
Deception Engineering: exploring the use of Windows Installer Packages against first stage payloads
1 year 1 month ago
Database Security Brief: The Oracle Critical Patch Update for April 2007
1 year 1 month ago
Database Security: A Christmas Carol
1 year 1 month ago
Data-mining with SQL Injection and Inference
1 year 1 month ago
DataArmor Full Disk Encryption 3.0.12c – Restricted Environment breakout, Privilege Escalation and Full Disk Decryption
1 year 1 month ago
Dangers of Kubernetes IAM Integrations
1 year 1 month ago
Dangling Cursor Snarfing: A New Class of Attack in Oracle
1 year 1 month ago
DARPA OnStar Vulnerability Analysis
1 year 1 month ago
D0nut encrypt me, I have a wife and no backups
1 year 1 month ago
Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG
1 year 1 month ago
D-LINK DIR-850L web admin interface vulnerable to stack-based buffer overflow
1 year 1 month ago
D-Link routers vulnerable to Remote Code Execution (RCE)
1 year 1 month ago
CyberVillainsCA
1 year 1 month ago
Cyber Security of New Space Paper
1 year 1 month ago
Cyber red-teaming business-critical systems while managing operational risk
1 year 1 month ago
Cyber Security in UK Agriculture
1 year 1 month ago
CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF) – Part 2
1 year 1 month ago
Cyber Essentials Scheme
1 year 1 month ago
Checked
4 hours ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed