NCC Group Research Blog
Android-KillPermAndSigChecks
11 months 1 week ago
Android Cloud Backup/Restore
11 months 1 week ago
Android Malware Vultur Expands Its Wingspan
11 months 1 week ago
Analysis of the Linux backdoor used in freenode IRC network compromise
11 months 1 week ago
Analyzing a PJL directory traversal vulnerability – exploiting the Lexmark MC3224i printer (part 2)
11 months 1 week ago
Analyzing AI Application Threat Models
11 months 1 week ago
Analysis of Boomerang Differential Trials via a SAT-Based Constraint Solver URSA
11 months 1 week ago
Analysis of setting cookies for third party websites in different browsers
11 months 1 week ago
An offensive guide to the Authorization Code grant
11 months 1 week ago
Analysing a recent Poison Ivy sample
11 months 1 week ago
An Introduction to Quantum Computing for Security Professionals
11 months 1 week ago
An Introduction to Ultrasound Security Research
11 months 1 week ago
An Introduction to Fault Injection (Part 1/3)
11 months 1 week ago
An Introduction to Heap overflows on AIX 5.3L
11 months 1 week ago
An Analysis of Mobile Geofencing App Security
11 months 1 week ago
An Illustrated Guide to Elliptic Curve Cryptography Validation
11 months 1 week ago
An Introduction to Authenticated Encryption
11 months 1 week ago
An Adventure in Contingency Debugging: Ruby IO#read/IO#write Considered Harmful
11 months 1 week ago
An adventure in PoEKmon NeutriGo land
11 months 1 week ago
Checked
3 hours 55 minutes ago