NCC Group Research Blog
Social Engineering Penetration Testing
1 year 2 months ago
Sobelow Update
1 year 2 months ago
Sobelow: Static analysis for the Phoenix Framework
1 year 2 months ago
SOC maturity & capability
1 year 2 months ago
Sniffle: A Sniffer for Bluetooth 5
1 year 2 months ago
So long and thanks for all the 0day
1 year 2 months ago
Smuggling HTA files in Internet Explorer/Edge
1 year 2 months ago
SnapMC skips ransomware, steals data
1 year 2 months ago
Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
1 year 2 months ago
SmarterMail – Stored XSS in emails
1 year 2 months ago
SMB hash hijacking & user tracking in MS Outlook
1 year 2 months ago
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
1 year 2 months ago
Signaturing an Authenticode anomaly with Yara
1 year 2 months ago
Singularity of Origin
1 year 2 months ago
Slotting Security into Corporate Development
1 year 2 months ago
Sifting through the spines: identifying (potential) Cactus ransomware victims
1 year 2 months ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
1 year 2 months ago
Shocker
1 year 2 months ago
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
1 year 2 months ago
Checked
11 hours 21 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed