NCC Group Research Blog
The economics of defensive security
1 year ago
The death of USB autorun and the rise of the USB keyboard
1 year ago
The Demise of Signature Based Antivirus
1 year ago
The Database Hacker’s Handbook
1 year ago
The Challenges of Fuzzing 5G Protocols
1 year ago
The CIS Security Standard for Docker available now
1 year ago
The Case of Missing File Extensions
1 year ago
The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems
1 year ago
The Automotive Threat Modeling Template
1 year ago
The Browser Hacker’s Handbook
1 year ago
The 9 Lives of Bleichenbacher’s CAT: New Cache ATtacks on TLS Implementations
1 year ago
The ABCs of NFC chip security
1 year ago
Testing Infrastructure-as-Code Using Dynamic Tooling
1 year ago
Testing Two-Factor Authentication
1 year ago
Testing HTTP/2 only web services
1 year ago
Technical Advisory: Unauthenticated Remote Command Execution through Multiple Vulnerabilities in Virgin Media Hub 3.0
1 year ago
Technical Advisory: Unauthenticated SQL Injection in Lansweeper
1 year ago
Technical Advisory: Sonos Era 100 Secure Boot Bypass Through Unchecked setenv() call
1 year ago
Technical Advisory: SQL Injection and Reflected Cross-Site Scripting (XSS) Vulnerabilities in Oracle Communications Diameter Signaling Router (CVE-2020-14787, CVE-2020-14788)
1 year ago
Checked
9 hours 40 minutes ago