NCC Group Research Blog
CERT C Secure Coding Standard
9 months ago
CERT Oracle Secure Coding Standard for Java
9 months ago
CECSTeR
9 months ago
Celebrating NCC Con Europe 2018
9 months ago
Call Map: A Tool for Navigating Call Graphs in Python
9 months ago
Car Parking Apps Vulnerable To Hacks
9 months ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
9 months ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
9 months ago
Bypassing Android’s Network Security Configuration
9 months ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
9 months ago
Building WiMap the Wi-Fi Mapping Drone (1)
9 months ago
Business Insights: Cyber Security in the Financial Sector
9 months ago
Building Security In: Software Penetration Testing
9 months ago
Building Systems from Commercial Components
9 months ago
Building WiMap the Wi-Fi Mapping Drone
9 months ago
Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures
9 months ago
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
9 months ago
Build Your Own Wi-Fi Mapping Drone Capability
9 months ago
Building an RDP Credential Catcher for Threat Intelligence
9 months ago
Checked
1 hour 57 minutes ago