NCC Group Research Blog
Software Verification and Analysis Using Z3
9 months 2 weeks ago
Social Engineering
9 months 2 weeks ago
Social Engineering Penetration Testing
9 months 2 weeks ago
Sobelow Update
9 months 2 weeks ago
Sobelow: Static analysis for the Phoenix Framework
9 months 2 weeks ago
SOC maturity & capability
9 months 2 weeks ago
Sniffle: A Sniffer for Bluetooth 5
9 months 2 weeks ago
So long and thanks for all the 0day
9 months 2 weeks ago
Smuggling HTA files in Internet Explorer/Edge
9 months 2 weeks ago
SnapMC skips ransomware, steals data
9 months 2 weeks ago
Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
9 months 2 weeks ago
SmarterMail – Stored XSS in emails
9 months 2 weeks ago
SMB hash hijacking & user tracking in MS Outlook
9 months 2 weeks ago
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
9 months 2 weeks ago
Signaturing an Authenticode anomaly with Yara
9 months 2 weeks ago
Singularity of Origin
9 months 2 weeks ago
Slotting Security into Corporate Development
9 months 2 weeks ago
Sifting through the spines: identifying (potential) Cactus ransomware victims
9 months 2 weeks ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
9 months 2 weeks ago
Checked
3 hours 34 minutes ago