NCC Group Research Blog
Exploiting MS15-061 Use-After-Free Windows Kernel Vulnerability
1 year ago
Exploiting CVE-2014-0282
1 year ago
Exploiting CVE-2014-0282 (1)
1 year ago
Experiments in Extending Thinkst Canary – Part 1
1 year ago
Exploit mitigations: keeping up with evolving and complex software/hardware
1 year ago
Exploit the Fuzz – Exploiting Vulnerabilities in 5G Core Networks
1 year ago
Eurocrypt 2023: Death of a KEM
1 year ago
Exception Handling and Data Integrity in Salesforce
1 year ago
EternalGlue part one: Rebuilding NotPetya to assess real-world resilience
1 year ago
Ethics in Security Testing
1 year ago
Enumerating System Management Interrupts
1 year ago
Erlang Security 101
1 year ago
Estimating the Bit Security of Pairing-Friendly Curves
1 year ago
Enterprise-scale seamless onboarding and deployment of Azure Sentinel using Lighthouse for multi-tenant environments
1 year ago
Endpoint connectivity
1 year ago
Encryption at rest: Not the panacea to data protection
1 year ago
Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm
1 year ago
End-of-life pragmatism
1 year ago
Embedded Device Security Certifications
1 year ago
Checked
4 hours 58 minutes ago