NCC Group Research Blog
Ransomware: what organisations can do to survive
1 year 2 months ago
Python Class Informer: an IDAPython plugin for viewing run-time type information (RTTI)
1 year 2 months ago
Quantum Cryptography – A Study Into Present Technologies and Future Applications
1 year 2 months ago
pySimReader
1 year 2 months ago
Pumping Iron on the Musl Heap – Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap
1 year 2 months ago
Puckungfu 2: Another NETGEAR WAN Command Injection
1 year 2 months ago
Puckungfu: A NETGEAR WAN Command Injection
1 year 2 months ago
Public Report – AWS Nitro System API & Security Claims Italian
1 year 2 months ago
Public Report – AWS Nitro System API & Security Claims Spanish
1 year 2 months ago
Public Report: Aleo snarkOS Implementation and Consensus Mechanism Review
1 year 2 months ago
Public Report – AWS Nitro System API & Security Claims French
1 year 2 months ago
Public Report – AWS Nitro System API & Security Claims German
1 year 2 months ago
Public Report – AWS Nitro System API & Security Claims
1 year 2 months ago
Public Report – Aleo snarkVM Implementation Review
1 year 2 months ago
Public Report – Zcash FROST Security Assessment
1 year 2 months ago
Public Report – Solana Program Library ZK-Token Security Assessment
1 year 2 months ago
Public Report – Zendoo Proof Verifier Cryptography Review
1 year 2 months ago
Public Report – Entropy/Rust Cryptography Review
1 year 2 months ago
Public Report – Zcash NU5 Cryptography Review
1 year 2 months ago
Checked
3 hours 25 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed