NCC Group Research Blog
Chafer backdoor analysis
5 months ago
CERT C Secure Coding Standard
5 months ago
CERT Oracle Secure Coding Standard for Java
5 months ago
CECSTeR
5 months ago
Celebrating NCC Con Europe 2018
5 months ago
Call Map: A Tool for Navigating Call Graphs in Python
5 months ago
Car Parking Apps Vulnerable To Hacks
5 months ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
5 months ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
5 months ago
Bypassing Android’s Network Security Configuration
5 months ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
5 months ago
Building WiMap the Wi-Fi Mapping Drone (1)
5 months ago
Business Insights: Cyber Security in the Financial Sector
5 months ago
Building Security In: Software Penetration Testing
5 months ago
Building Systems from Commercial Components
5 months ago
Building WiMap the Wi-Fi Mapping Drone
5 months ago
Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures
5 months ago
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
5 months ago
Build Your Own Wi-Fi Mapping Drone Capability
5 months ago
Checked
2 hours 57 minutes ago