NCC Group Research Blog
How organisations can properly configure SSL services to ensure the integrity and confidentiality of data in transit
1 year 2 months ago
How to Backdoor Diffie-Hellman
1 year 2 months ago
How to protect yourself & your organisation from phishing attacks
1 year 2 months ago
How Microsoft Office knows a document came from the Internet and might be dangerous
1 year 2 months ago
How much training should staff have on cyber security?
1 year 2 months ago
House
1 year 2 months ago
How cryptography is used to monitor the spread of COVID-19
1 year 2 months ago
How I did not get a shell
1 year 2 months ago
HITBAMS – Your Not so “Home” Office – Soho Hacking at Pwn2Own
1 year 2 months ago
hostresolver
1 year 2 months ago
HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack
1 year 2 months ago
HIDDEN COBRA Volgmer: A Technical Analysis
1 year 2 months ago
Helping Engineering Teams Tackle Security Debt in Embedded Systems: U-Boot Configuration Auditing Introduced in Depthcharge v0.2.0
1 year 2 months ago
Hiccupy
1 year 2 months ago
Heartbleed (CVE-2014-0160) Advisory
1 year 2 months ago
Heartbleed OpenSSL vulnerability
1 year 2 months ago
HDMI – Hacking Displays Made Interesting
1 year 2 months ago
HDMI Ethernet Channel
1 year 2 months ago
Hardware Security By Design: ESP32 Guidance
1 year 2 months ago
Checked
13 hours 15 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed