NCC Group Research Blog
Threat Profiling Microsoft SQL Server
5 months ago
Third party assurance
5 months ago
Threat Actors: exploiting the pandemic
5 months ago
There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
5 months ago
They Ought to Know Better: Exploiting Security Gateways via their Web Interfaces
5 months ago
Thin Clients: Slim Security
5 months ago
The why behind web application penetration test prerequisites
5 months ago
There’s A Hole In Your SoC: Glitching The MediaTek BootROM
5 months ago
The SSL Conservatory
5 months ago
The Update Framework (TUF) Security Assessment
5 months ago
The Sorry State of Aftermarket Head Unit Security
5 months ago
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
5 months ago
The role of security research in improving cyber security
5 months ago
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
5 months ago
The Pentesters Guide to Akamai
5 months ago
The Pharming Guide – Understanding and preventing DNS related attacks by phishers
5 months ago
The Phishing Guide: Understanding & Preventing Phishing Attacks
5 months ago
The Paillier Cryptosystem with Applications to Threshold ECDSA
5 months ago
The Password is Dead, Long Live the Password!
5 months ago
Checked
2 hours 39 minutes ago