NCC Group Research Blog
Discovering Smart Contract Vulnerabilities with GOATCasino
10 months 2 weeks ago
Dissecting social engineering attacks
10 months 2 weeks ago
DIBF – Updated
10 months 2 weeks ago
Disabling Office Macros to Reduce Malware Infections
10 months 2 weeks ago
Developing Secure Mobile Applications for Android
10 months 2 weeks ago
Detection Engineering for Kubernetes clusters
10 months 2 weeks ago
Detecting Mimikatz with Busylight
10 months 2 weeks ago
Detecting Rclone – An Effective Tool for Exfiltration
10 months 2 weeks ago
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
10 months 2 weeks ago
Detecting Karakurt – an extortion focused threat actor
10 months 2 weeks ago
Detecting and Hunting for the PetitPotam NTLM Relay Attack
10 months 2 weeks ago
Detecting and Protecting when Remote Desktop Protocol (RDP) is open to the Internet
10 months 2 weeks ago
Detecting anomalous Vectored Exception Handlers on Windows
10 months 2 weeks ago
Derusbi: A Case Study in Rapid Capability Development
10 months 2 weeks ago
Detecting and Hunting for the Malicious NetFilter Driver
10 months 2 weeks ago
Demystifying Multivariate Cryptography
10 months 2 weeks ago
Denial of Service in Parsing a URL by ierutil.dll
10 months 2 weeks ago
Demystifying Cobalt Strike’s “make_token” Command
10 months 2 weeks ago
Demystifying AWS’ AssumeRole and sts:ExternalId
10 months 2 weeks ago
Checked
5 hours 30 minutes ago