NCC Group Research Blog
Adobe Flash Player Cross Domain Policy Bypass
9 months ago
Adobe flash sandbox bypass to navigate to local drives
9 months ago
Advanced Exploitation of Oracle PL/SQL Flaws
9 months ago
Accessing Private Fields Outside of Classes in Java
9 months ago
Adobe Acrobat Reader XML Forms Data Format Buffer Overflow
9 months ago
Abusing Blu-ray Players Part 1 – Sandbox Escapes
9 months ago
Abusing Privileged and Unprivileged Linux Containers
9 months ago
Absolute Security
9 months ago
ABSTRACT SHIMMER (CVE-2020-15257): Host Networking is root-Equivalent, Again
9 months ago
A WarCon 2017 Presentation: Cisco ASA – Exploiting the IKEv1 Heap Overflow – CVE-2016-1287
9 months ago
“We wait, because we know you.” Inside the ransomware negotiation economics.
9 months ago
A Survey of Istio’s Network Security Features
9 months ago
A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM
9 months ago
A Simple and Practical Approach to Input Validation
9 months ago
A Peek Behind the Great Firewall of Russia
9 months ago
A Primer On Slowable Encoders
9 months ago
A jq255 Elliptic Curve Specification, and a Retrospective
9 months ago
A Look At Some Real-World Obfuscation Techniques
9 months ago
A New Flying Kitten?
9 months ago
Checked
1 hour 57 minutes ago