NCC Group Research Blog
Paradoxical Compression with Verifiable Delay Functions
1 year 3 months ago
Passive Decryption of Ethereum Peer-to-Peer Traffic
1 year 3 months ago
Pairing over BLS12-381, Part 3: Pairing!
1 year 3 months ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
1 year 3 months ago
Pairing over BLS12-381, Part 1: Fields
1 year 3 months ago
Pairing over BLS12-381, Part 2: Curves
1 year 3 months ago
Package Play
1 year 3 months ago
Padding the struct: How a compiler optimization can disclose stack memory
1 year 3 months ago
OSX afpserver remote code execution
1 year 3 months ago
Overview of Modern Memory Security Concerns
1 year 3 months ago
Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
1 year 3 months ago
OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
1 year 3 months ago
osquery Application Security Assessment Public Report
1 year 3 months ago
Order Details Screens and PII
1 year 3 months ago
OS X 10.6.6 Camera Raw Library Memory Corruption
1 year 3 months ago
Oracle Retail Integration Bus Manager Directory Traversal
1 year 3 months ago
Oracle Retail Invoice Manager SQL Injection
1 year 3 months ago
Oracle Hyperion 11 Directory Traversal
1 year 3 months ago
Oracle Java Installer Adds a System Path Which is Writable by All
1 year 3 months ago
Checked
3 hours 39 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed