NCC Group Research Blog
Windows Phone 7 Application Security Survey
1 year 1 month ago
Windows Remote Desktop Memory Corruption Leading to RCE on XPSP3
1 year 1 month ago
Windows IPC Fuzzing Tools
1 year 1 month ago
Windows Firewall Hook Enumeration
1 year 1 month ago
Windows DACLs & Why There Is Still Room for Interest
1 year 1 month ago
Windows 2000 Format String Vulnerabilities
1 year 1 month ago
Windows DACL Enum Project
1 year 1 month ago
Why IoT Security Matters
1 year 1 month ago
Windows 10 USB Mass Storage driver arbitrary code execution in kernel mode
1 year 1 month ago
Whitepaper: Perfect Forward Security
1 year 1 month ago
Whitepaper: Recognizing and Preventing TOCTOU
1 year 1 month ago
Why AI Will Not Fully Replace Humans for Web Penetration Testing
1 year 1 month ago
Whitepaper – XML Schema, DTD, and Entity Attacks: A Compendium of Known Techniques
1 year 1 month ago
Whitepaper: CA Alternative
1 year 1 month ago
Whitepaper – Project Triforce: Run AFL On Everything (2017)
1 year 1 month ago
Whitepaper – Weaning the Web off of Session Cookies: Making Digest Authentication Viable
1 year 1 month ago
Whitepaper – Microcontroller Readback Protection: Bypasses and Defenses
1 year 1 month ago
Whitepaper – Practical Attacks on Machine Learning Systems
1 year 1 month ago
Whitepaper – Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm’s TrustZone
1 year 1 month ago
Checked
4 hours 14 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed