NCC Group Research Blog
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
1 year 3 months ago
Extractor
1 year 3 months ago
Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
1 year 3 months ago
Extending a Thinkst Canary to become an interactive honeypot
1 year 3 months ago
External Enumeration and Exploitation of Email and Web Security Solutions
1 year 3 months ago
Extracting the Payload from a CVE-2014-1761 RTF Document
1 year 3 months ago
Exporting non-exportable RSA keys
1 year 3 months ago
Exposing Vulnerabilities in Media Software
1 year 3 months ago
Exploring Prompt Injection Attacks
1 year 3 months ago
Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
1 year 3 months ago
Exploring Verifiable Random Functions in Code
1 year 3 months ago
Exploring macOS Calendar Alerts: Part 2 – Exfiltrating data (CVE-2020-3882)
1 year 3 months ago
Exploring Overfitting Risks in Large Language Models
1 year 3 months ago
Exploring DeepFake Capabilities & Mitigation Strategies with University College London
1 year 3 months ago
Exploring macOS Calendar Alerts: Part 1 – Attempting to execute code
1 year 3 months ago
Exploiting Security Gateways Via Web Interfaces
1 year 3 months ago
Exploiting the Sudo Baron Samedit vulnerability (CVE-2021-3156) on VMWare vCenter Server 7.0
1 year 3 months ago
Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE-2015-0057) bug on both 32-bit and 64-bit
1 year 3 months ago
Exploiting Rich Content
1 year 3 months ago
Checked
5 hours 7 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed