NCC Group Research Blog
SnapMC skips ransomware, steals data
1 year ago
Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
1 year ago
SmarterMail – Stored XSS in emails
1 year ago
SMB hash hijacking & user tracking in MS Outlook
1 year ago
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
1 year ago
Signaturing an Authenticode anomaly with Yara
1 year ago
Singularity of Origin
1 year ago
Slotting Security into Corporate Development
1 year ago
Sifting through the spines: identifying (potential) Cactus ransomware victims
1 year ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
1 year ago
Shocker
1 year ago
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
1 year ago
SIAM AG23: Algebraic Geometry with Friends
1 year ago
Shining the Light on Black Basta
1 year ago
Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
1 year ago
Shell Arithmetic Expansion and Evaluation Abuse
1 year ago
Shellshock Advisory
1 year ago
Shellshock Bash Vulnerability
1 year ago
Sharkbot is back in Google Play
1 year ago
Checked
10 hours 8 minutes ago