NCC Group Research Blog
Reviewing Verifiable Random Functions
1 year ago
Reverse engineering and decrypting CyberArk vault credential files
1 year ago
Reverse Engineering Coin Hunt World’s Binary Protocol
1 year ago
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
1 year ago
Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions 2013
1 year ago
Research Report – Zephyr and MCUboot Security Assessment
1 year ago
Retro Gaming Vulnerability Research: Warcraft 2
1 year ago
Return of the hidden number problem
1 year ago
Research Paper – Recovering deleted data from the Windows registry
1 year ago
Research Insights Volume 9 – Modern Security Vulnerability Discovery
1 year ago
Research Paper – Machine Learning for Static Malware Analysis, with University College London
1 year ago
Research Insights Volume 8 – Hardware Design: FPGA Security Risks
1 year ago
Research Insights Volume 6: Common Issues with Environment Breakouts
1 year ago
Research Insights Volume 7: Exploitation Advancements
1 year ago
Research Insights Volume 4 – Sector Focus: Maritime Sector
1 year ago
Research Insights Volume 5 – Sector Focus: Automotive
1 year ago
Research Insights Volume 2 – Defensive Trends
1 year ago
Research Insights Volume 3 – How are we breaking in: Mobile Security
1 year ago
Remote Exploitation of Microsoft Office DLL Hijacking (MS15-132) via Browsers
1 year ago
Checked
10 hours 1 minute ago