NCC Group Research Blog
RIFT: F5 CVE-2020-5902 and Citrix CVE-2020-8193, CVE-2020-8195 and CVE-2020-8196 honeypot data release
1 year 2 months ago
RIFT: F5 Networks K52145254: TMUI RCE vulnerability CVE-2020-5902 Intelligence
1 year 2 months ago
RIFT: Citrix ADC Vulnerabilities CVE-2020-8193, CVE-2020-8195 and CVE-2020-8196 Intelligence
1 year 2 months ago
RIFT: Detection capabilities for recent F5 BIG-IP/BIG-IQ iControl REST API vulnerabilities CVE-2021-22986
1 year 2 months ago
Ricochet Security Assessment Public Report
1 year 2 months ago
RIFT: Analysing a Lazarus Shellcode Execution Method
1 year 2 months ago
Reverse, Reveal, Recover: Windows Defender Quarantine Forensics
1 year 2 months ago
Reviewing Verifiable Random Functions
1 year 2 months ago
Reverse engineering and decrypting CyberArk vault credential files
1 year 2 months ago
Reverse Engineering Coin Hunt World’s Binary Protocol
1 year 2 months ago
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
1 year 2 months ago
Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions 2013
1 year 2 months ago
Research Report – Zephyr and MCUboot Security Assessment
1 year 2 months ago
Retro Gaming Vulnerability Research: Warcraft 2
1 year 2 months ago
Return of the hidden number problem
1 year 2 months ago
Research Paper – Recovering deleted data from the Windows registry
1 year 2 months ago
Research Insights Volume 9 – Modern Security Vulnerability Discovery
1 year 2 months ago
Research Paper – Machine Learning for Static Malware Analysis, with University College London
1 year 2 months ago
Research Insights Volume 8 – Hardware Design: FPGA Security Risks
1 year 2 months ago
Checked
13 hours 14 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed