NCC Group Research Blog
Lessons learned from 50 bugs: Common USB driver vulnerabilities
9 months ago
Lending a hand to the community – Covenant v0.7 Updates
9 months ago
LDAPFragger: Bypassing network restrictions using LDAP attributes
9 months ago
LeaPFRogging PFR Implementations
9 months ago
LAPSUS$: Recent techniques, tactics and procedures
9 months ago
Latest threats to the connected car & intelligent transport ecosystem
9 months ago
Launching the first in our series of Research Insights
9 months ago
Kubernetes Security: Consider Your Threat Model
9 months ago
lapith
9 months ago
Kerberos Resource-Based Constrained Delegation: When an Image Change Leads to a Privilege Escalation
9 months ago
Kivlad
9 months ago
Java RMI Registry.bind() Unvalidated Deserialization
9 months ago
Java Web Start File Inclusion via System Properties Override
9 months ago
Jenkins Plugins and Core Technical Summary Advisory
9 months ago
Jailbreak, updated and open-sourced
9 months ago
Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs
9 months ago
Jackson Deserialization Vulnerabilities
9 months ago
Jailbreak
9 months ago
ISM RAT
9 months ago
Checked
3 hours 6 minutes ago