NCC Group Research Blog
Payment Card Industry Data Security Standard (PCI DSS) A Navigation and Explanation of Changes from v2.0 to v3.0
1 year 2 months ago
Past, Present and Future of Effective C
1 year 2 months ago
Password and brute-force mitigation policies
1 year 2 months ago
Passive Information Gathering – The Analysis of Leaked Network Security Information
1 year 2 months ago
Paradoxical Compression with Verifiable Delay Functions
1 year 2 months ago
Passive Decryption of Ethereum Peer-to-Peer Traffic
1 year 2 months ago
Pairing over BLS12-381, Part 3: Pairing!
1 year 2 months ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
1 year 2 months ago
Pairing over BLS12-381, Part 1: Fields
1 year 2 months ago
Pairing over BLS12-381, Part 2: Curves
1 year 2 months ago
Package Play
1 year 2 months ago
Padding the struct: How a compiler optimization can disclose stack memory
1 year 2 months ago
OSX afpserver remote code execution
1 year 2 months ago
Overview of Modern Memory Security Concerns
1 year 2 months ago
Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
1 year 2 months ago
OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
1 year 2 months ago
osquery Application Security Assessment Public Report
1 year 2 months ago
Order Details Screens and PII
1 year 2 months ago
OS X 10.6.6 Camera Raw Library Memory Corruption
1 year 2 months ago
Checked
5 hours 3 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed