NCC Group Research Blog
Enterprise-scale seamless onboarding and deployment of Azure Sentinel using Lighthouse for multi-tenant environments
1 year 1 month ago
Endpoint connectivity
1 year 1 month ago
Encryption at rest: Not the panacea to data protection
1 year 1 month ago
Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm
1 year 1 month ago
End-of-life pragmatism
1 year 1 month ago
Embedded Device Security Certifications
1 year 1 month ago
Emissary Panda – A potential new malicious tool
1 year 1 month ago
EDIDFuzzer
1 year 1 month ago
Elephant in the Boardroom Survey 2016
1 year 1 month ago
eBook: Breach notification under GDPR – How to communicate a personal data breach
1 year 1 month ago
eBPF Adventures: Fiddling with the Linux Kernel and Unix Domain Sockets
1 year 1 month ago
eBook – Planning a robust incident response process
1 year 1 month ago
eBook – Do you know how your organisation would react in a real-world attack scenario?
1 year 1 month ago
easyda
1 year 1 month ago
EasyDA – Easy Windows Domain Access Script
1 year 1 month ago
Early CCS Attack Analysis
1 year 1 month ago
earlyremoval, in the Conservatory, with the Wrench: Exploring Ghidra’s decompiler internals to make automatic P-Code analysis scripts
1 year 1 month ago
Dynamic Linq Injection Remote Code Execution Vulnerability (CVE-2023-32571)
1 year 1 month ago
E-mail Spoofing and CDONTS.NEWMAIL
1 year 1 month ago
Checked
2 hours 6 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed