NCC Group Research Blog
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
9 months 2 weeks ago
A Guide to Improving Security Through Infrastructure-as-Code
9 months 2 weeks ago
A deeper dive into CVE-2021-39137 – a Golang security bug that Rust would have prevented
9 months 2 weeks ago
A few notes on usefully exploiting libstagefright on Android 5.x
9 months 2 weeks ago
A Brief Review of Bitcoin Locking Scripts and Ordinals
9 months 2 weeks ago
A Census of Deployed Pulse Connect Secure (PCS) Versions
9 months 2 weeks ago
A Back-to-Front TrueCrypt Recovery Story: The Plaintext is the Ciphertext
9 months 2 weeks ago
A brief look at Windows telemetry: CIT aka Customer Interaction Tracker
9 months 2 weeks ago
44Con2013Game
9 months 2 weeks ago
5G security – how to minimise the threats to a 5G network
9 months 2 weeks ago
10 real-world stories of how we’ve compromised CI/CD pipelines
9 months 2 weeks ago
44CON Workshop – How to assess and secure iOS apps
9 months 2 weeks ago
Checked
2 hours 14 minutes ago