NCC Group Research Blog
Variations in Exploit methods between Linux and Windows
5 months ago
Using SharePoint as a Phishing Platform
5 months ago
Vaccine Misinformation Part 1: Misinformation Attacks as a Cyber Kill Chain
5 months ago
Using AWS and Azure for Cost Effective Log Ingestion with Data Processing Pipelines for SIEMs
5 months ago
Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things
5 months ago
Using Semgrep with Jupyter Notebook files
5 months ago
Use of Deserialisation in .NET Framework Methods and Classes
5 months ago
Username enumeration techniques and their value
5 months ago
USB Undermining Security Barriers:further adventures with USB
5 months ago
Use and enforce Multi-Factor Authentication
5 months ago
USB keyboards by post – use of embedded keystroke injectors to bypass autorun restrictions on modern desktop operating systems
5 months ago
USB under the bonnet: Implications of USB security vulnerabilities in vehicle systems
5 months ago
Updated: Technical Advisory and Proofs of Concept – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)
5 months ago
USB attacks need physical access right? Not any more…
5 months ago
Unmasking Lorenz Ransomware: A Dive into Recent Tactics, Techniques and Procedures
5 months ago
Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
5 months ago
Understanding the Impact of Ransomware on Patient Outcomes – Do We Know Enough?
5 months ago
Understanding the insider threat & how to mitigate it
5 months ago
Understanding the root cause of F5 Networks K52145254: TMUI RCE vulnerability CVE-2020-5902
5 months ago
Checked
2 hours 40 minutes ago