NCC Group Research Blog
NX Server for Linux Arbitrary Files can be read with root privileges
1 year 3 months ago
      
OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel
1 year 3 months ago
      
Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP
1 year 3 months ago
      
North Korea’s Lazarus: their initial access trade-craft using social media and social engineering
1 year 3 months ago
      
NSA & CISA Kubernetes Security Guidance – A Critical Review
1 year 3 months ago
      
Non-Deterministic Nature of Prompt Injection
1 year 3 months ago
      
Non-flood/non-volumetric Distributed Denial of Service (DDoS)
1 year 3 months ago
      
Non Obvious PE Parsers – The .NET runtime – Part 1
1 year 3 months ago
      
Nine years of bugs at NCC Group
1 year 3 months ago
      
NIST Selects Post-Quantum Algorithms for Standardization
1 year 3 months ago
      
New Attack Vectors and a Vulnerability Dissection of MS03-007
1 year 3 months ago
      
New Sources of Microsoft Office Metadata – Tool Release MetadataPlus
1 year 3 months ago
      
NETGEAR Routers: A Playground for Hackers?
1 year 3 months ago
      
Network Attached Security: Attacking a Synology NAS
1 year 3 months ago
      
Nerve
1 year 3 months ago
      
Nessus Authenticated Scan – Local Privilege Escalation
1 year 3 months ago
      
NCC Group’s Exploit Development Capability: Why and What
1 year 3 months ago
      
ncccodenavi
1 year 3 months ago
      
NCLoader
1 year 3 months ago
      
Checked
              1 hour 11 minutes ago
          Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
  
  
    NCC Group Research Blog feed