NCC Group Research Blog
Beyond data loss prevention
5 months ago
Bit51 Better Security WP Security Plugin – Unauthenticated Stored XSS to RCE
5 months ago
Black Hat 2013 – Bluetooth Smart Presentation Available
5 months ago
Best Practices for the use of Static Code Analysis within a Real-World Secure Development Lifecycle
5 months ago
Best practices with BYOD
5 months ago
Berserko: Kerberos Authentication for Burp Suite
5 months ago
BAT: a Fast and Small Key Encapsulation Mechanism
5 months ago
Batten down the hatches: Cyber threats facing DP operations
5 months ago
Back Office Web Administration Authentication Bypass
5 months ago
Azucar
5 months ago
Back in Black: Unlocking a LockBit 3.0 Ransomware Attack
5 months ago
AWS environment security assessment with Scout2
5 months ago
AWS Inventory: A tool for mapping AWS resources
5 months ago
Avoiding Pitfalls Developing with Electron
5 months ago
Automating extraction from malware and recent campaign analysis
5 months ago
AutoRepeater: Automated HTTP Request Repeating With Burp Suite
5 months ago
Autochrome
5 months ago
Automated enumeration of email filtering solutions
5 months ago
Automated Reverse Engineering of Relationships Between Data Structures in C++ Binaries
5 months ago
Checked
2 hours 38 minutes ago