NCC Group Research Blog
Estimating the Bit Security of Pairing-Friendly Curves
9 months ago
Enterprise-scale seamless onboarding and deployment of Azure Sentinel using Lighthouse for multi-tenant environments
9 months ago
Endpoint connectivity
9 months ago
Encryption at rest: Not the panacea to data protection
9 months ago
Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm
9 months ago
End-of-life pragmatism
9 months ago
Embedded Device Security Certifications
9 months ago
Emissary Panda – A potential new malicious tool
9 months ago
EDIDFuzzer
9 months ago
Elephant in the Boardroom Survey 2016
9 months ago
eBook: Breach notification under GDPR – How to communicate a personal data breach
9 months ago
eBPF Adventures: Fiddling with the Linux Kernel and Unix Domain Sockets
9 months ago
eBook – Planning a robust incident response process
9 months ago
eBook – Do you know how your organisation would react in a real-world attack scenario?
9 months ago
easyda
9 months ago
EasyDA – Easy Windows Domain Access Script
9 months ago
Early CCS Attack Analysis
9 months ago
earlyremoval, in the Conservatory, with the Wrench: Exploring Ghidra’s decompiler internals to make automatic P-Code analysis scripts
9 months ago
Dynamic Linq Injection Remote Code Execution Vulnerability (CVE-2023-32571)
9 months ago
Checked
6 hours 14 minutes ago