NCC Group Research Blog
Machine Learning 102: Attacking Facial Authentication with Poisoned Data
1 year 3 months ago
LTair: The LTE Air Interface Tool
1 year 3 months ago
Lumension Device Control (formerly Sanctuary) remote memory corruption
1 year 3 months ago
Login Service Security
1 year 3 months ago
Logs, Logs, the Audit Trail – Features of a Successful Log Management Solution
1 year 3 months ago
Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel
1 year 3 months ago
Log4Shell: Reconnaissance and post exploitation network detection
1 year 3 months ago
Live Incident Blog: June Global Ransomware Outbreak
1 year 3 months ago
Local network compromise despite good patching
1 year 3 months ago
log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
1 year 3 months ago
libtalloc: A GDB plugin for analysing the talloc heap
1 year 3 months ago
Lights, Camera, HACKED! An insight into the world of popular IP Cameras
1 year 3 months ago
Lessons learned from 50 USB bugs
1 year 3 months ago
LibAVCodec AMV Out of Array Write
1 year 3 months ago
Lessons learned from 50 bugs: Common USB driver vulnerabilities
1 year 3 months ago
Lending a hand to the community – Covenant v0.7 Updates
1 year 3 months ago
LDAPFragger: Bypassing network restrictions using LDAP attributes
1 year 3 months ago
LeaPFRogging PFR Implementations
1 year 3 months ago
LAPSUS$: Recent techniques, tactics and procedures
1 year 3 months ago
Checked
7 hours 1 minute ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed