NCC Group Research Blog
Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things
1 year 1 month ago
Using Semgrep with Jupyter Notebook files
1 year 1 month ago
Use of Deserialisation in .NET Framework Methods and Classes
1 year 1 month ago
Username enumeration techniques and their value
1 year 1 month ago
USB Undermining Security Barriers:further adventures with USB
1 year 1 month ago
Use and enforce Multi-Factor Authentication
1 year 1 month ago
USB keyboards by post – use of embedded keystroke injectors to bypass autorun restrictions on modern desktop operating systems
1 year 1 month ago
USB under the bonnet: Implications of USB security vulnerabilities in vehicle systems
1 year 1 month ago
Updated: Technical Advisory and Proofs of Concept – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)
1 year 1 month ago
USB attacks need physical access right? Not any more…
1 year 1 month ago
Unmasking Lorenz Ransomware: A Dive into Recent Tactics, Techniques and Procedures
1 year 1 month ago
Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
1 year 1 month ago
Understanding the Impact of Ransomware on Patient Outcomes – Do We Know Enough?
1 year 1 month ago
Understanding the insider threat & how to mitigate it
1 year 1 month ago
Understanding the root cause of F5 Networks K52145254: TMUI RCE vulnerability CVE-2020-5902
1 year 1 month ago
Understanding Ransomware
1 year 1 month ago
Understanding Ransomware: Impact, Evolution and Defensive Strategies
1 year 1 month ago
Understanding Microsoft Word OLE Exploit Primitives
1 year 1 month ago
Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability
1 year 1 month ago
Checked
5 hours 41 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed