NCC Group Research Blog
Third party assurance
9 months ago
Threat Actors: exploiting the pandemic
9 months ago
There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
9 months ago
They Ought to Know Better: Exploiting Security Gateways via their Web Interfaces
9 months ago
Thin Clients: Slim Security
9 months ago
The why behind web application penetration test prerequisites
9 months ago
There’s A Hole In Your SoC: Glitching The MediaTek BootROM
9 months ago
The SSL Conservatory
9 months ago
The Update Framework (TUF) Security Assessment
9 months ago
The Sorry State of Aftermarket Head Unit Security
9 months ago
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
9 months ago
The role of security research in improving cyber security
9 months ago
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
9 months ago
The Pentesters Guide to Akamai
9 months ago
The Pharming Guide – Understanding and preventing DNS related attacks by phishers
9 months ago
The Phishing Guide: Understanding & Preventing Phishing Attacks
9 months ago
The Paillier Cryptosystem with Applications to Threshold ECDSA
9 months ago
The Password is Dead, Long Live the Password!
9 months ago
The Next C Language Standard (C23)
9 months ago
Checked
1 hour 57 minutes ago