NCC Group Research Blog
Legacy Technology in Transport: More Than “Old Tech”
1 day 4 hours ago
Unmasking Techno Sophists
2 days 21 hours ago
Public Report: VetKeys Cryptography Review
3 days 3 hours ago
Goal-Based Regulation
4 days 2 hours ago
State of the Art of Private Key Security in Blockchain Ops - 1. Concepts, Types of Wallets and Signing Strategies
1 week ago
Your point of departure for forensic readiness
1 week 1 day ago
VMware Workstation Guest-to-Host Escape Exploit Development
1 week 2 days ago
Voice Impersonation and DeepFake Vishing in Realtime
1 week 2 days ago
Technical Advisory: Tesla Telematics Control Unit - ADB Auth Bypass
1 week 4 days ago
When Guardrails Aren't Enough: Reinventing Agentic AI Security With Architectural Controls
3 weeks 2 days ago
Public Report: Meta Whatsapp message summarization service
1 month 1 week ago
A Look at RTEMS Security
1 month 3 weeks ago
Rapid Breach: Social Engineering to Remote Access in 300 Seconds
2 months ago
Autonomous AI Agents: A hidden Risk in Insecure smolagents “CodeAgent” Usage
2 months 2 weeks ago
Fake CAPTCHA led to LUMMA
2 months 2 weeks ago
Masquerade: You Downloaded ScreenConnect not Grok AI!
2 months 3 weeks ago
Public Report - Google Confidential Space Security Assessment
2 months 3 weeks ago
Technical Advisory: Condeon CMS
2 months 4 weeks ago
Quantum Data Centre of the Future
3 months 1 week ago
Checked
2 hours 49 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed