NCC Group Research Blog
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
10 months 2 weeks ago
Signaturing an Authenticode anomaly with Yara
10 months 2 weeks ago
Singularity of Origin
10 months 2 weeks ago
Slotting Security into Corporate Development
10 months 2 weeks ago
Sifting through the spines: identifying (potential) Cactus ransomware victims
10 months 2 weeks ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
10 months 2 weeks ago
Shocker
10 months 2 weeks ago
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
10 months 2 weeks ago
SIAM AG23: Algebraic Geometry with Friends
10 months 2 weeks ago
Shining the Light on Black Basta
10 months 2 weeks ago
Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
10 months 2 weeks ago
Shell Arithmetic Expansion and Evaluation Abuse
10 months 2 weeks ago
Shellshock Advisory
10 months 2 weeks ago
Shellshock Bash Vulnerability
10 months 2 weeks ago
Sharkbot is back in Google Play
10 months 2 weeks ago
SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store
10 months 2 weeks ago
Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark
10 months 2 weeks ago
Setting a New Standard for Kubernetes Deployments
10 months 2 weeks ago
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
10 months 2 weeks ago
Checked
1 hour 50 minutes ago