NCC Group Research Blog
Game Security
1 year 2 months ago
General Data Protection Regulation – are you ready?
1 year 2 months ago
Fuzzing USB devices using Frisbee Lite
1 year 2 months ago
Fuzzing RTSP to discover an exploitable vulnerability in VLC
1 year 2 months ago
Fuzzing the Easy Way Using Zulu
1 year 2 months ago
Fuzzing the Easy Way Using Zulu (1)
1 year 2 months ago
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
1 year 2 months ago
Fuzzbox
1 year 2 months ago
FrisbeeLite
1 year 2 months ago
From CSV to CMD to qwerty
1 year 2 months ago
FPGAs: Security Through Obscurity?
1 year 2 months ago
Freddy: An extension for automatically identifying deserialisation issues in Java and .NET applications
1 year 2 months ago
Flubot: the evolution of a notorious Android Banking Malware
1 year 2 months ago
Forensic Fuzzing Tools
1 year 2 months ago
Fix Bounty
1 year 2 months ago
Flash local-with-filesystem Bypass in navigateToURL
1 year 2 months ago
Flash security restrictions bypass: File upload by URLRequest
1 year 2 months ago
firstexecution
1 year 2 months ago
Five Essential Machine Learning Security Papers
1 year 2 months ago
Checked
11 hours 26 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed