NCC Group Research Blog
Cisco ASA series part eight: Exploiting the CVE-2016-1287 heap overflow over IKEv1
10 months 2 weeks ago
Cisco ASA series part five: libptmalloc gdb plugin
10 months 2 weeks ago
Check out our new Microcorruption challenges!
10 months 2 weeks ago
Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
10 months 2 weeks ago
Chrome Password Manager Cross Origin Weakness
10 months 2 weeks ago
CertPortal: Building Self-Service Secure S/MIME Provisioning Portal
10 months 2 weeks ago
Chafer backdoor analysis
10 months 2 weeks ago
CERT C Secure Coding Standard
10 months 2 weeks ago
CERT Oracle Secure Coding Standard for Java
10 months 2 weeks ago
CECSTeR
10 months 2 weeks ago
Celebrating NCC Con Europe 2018
10 months 2 weeks ago
Call Map: A Tool for Navigating Call Graphs in Python
10 months 2 weeks ago
Car Parking Apps Vulnerable To Hacks
10 months 2 weeks ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
10 months 2 weeks ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
10 months 2 weeks ago
Bypassing Android’s Network Security Configuration
10 months 2 weeks ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
10 months 2 weeks ago
Building WiMap the Wi-Fi Mapping Drone (1)
10 months 2 weeks ago
Business Insights: Cyber Security in the Financial Sector
10 months 2 weeks ago
Checked
5 hours 18 minutes ago