NCC Group Research Blog
SIAM AG23: Algebraic Geometry with Friends
9 months ago
Shining the Light on Black Basta
9 months ago
Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
9 months ago
Shell Arithmetic Expansion and Evaluation Abuse
9 months ago
Shellshock Advisory
9 months ago
Shellshock Bash Vulnerability
9 months ago
Sharkbot is back in Google Play
9 months ago
SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store
9 months ago
Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark
9 months ago
Setting a New Standard for Kubernetes Deployments
9 months ago
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
9 months ago
Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond
9 months ago
Self-Driving Cars- The future is now…
9 months ago
Security impact of IoT on the Enterprise
9 months ago
Security of Things: An Implementer’s Guide to Cyber Security for Internet of Things Devices and Beyond
9 months ago
Security Considerations of zk-SNARK Parameter Multi-Party Computation
9 months ago
Security First Umbrella
9 months ago
Security Best Practice: Host Naming & URL Conventions
9 months ago
Security Code Review With ChatGPT
9 months ago
Checked
4 hours 28 minutes ago