NCC Group Research Blog
Extending a Thinkst Canary to become an interactive honeypot
7 months 2 weeks ago
External Enumeration and Exploitation of Email and Web Security Solutions
7 months 2 weeks ago
Extracting the Payload from a CVE-2014-1761 RTF Document
7 months 2 weeks ago
Exporting non-exportable RSA keys
7 months 2 weeks ago
Exposing Vulnerabilities in Media Software
7 months 2 weeks ago
Exploring Prompt Injection Attacks
7 months 2 weeks ago
Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
7 months 2 weeks ago
Exploring Verifiable Random Functions in Code
7 months 2 weeks ago
Exploring macOS Calendar Alerts: Part 2 – Exfiltrating data (CVE-2020-3882)
7 months 2 weeks ago
Exploring Overfitting Risks in Large Language Models
7 months 2 weeks ago
Exploring DeepFake Capabilities & Mitigation Strategies with University College London
7 months 2 weeks ago
Exploring macOS Calendar Alerts: Part 1 – Attempting to execute code
7 months 2 weeks ago
Exploiting Security Gateways Via Web Interfaces
7 months 2 weeks ago
Exploiting the Sudo Baron Samedit vulnerability (CVE-2021-3156) on VMWare vCenter Server 7.0
7 months 2 weeks ago
Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE-2015-0057) bug on both 32-bit and 64-bit
7 months 2 weeks ago
Exploiting Rich Content
7 months 2 weeks ago
Exploiting Samba CVE-2015-0240 on Ubuntu 12.04 and Debian 7 32-bit
7 months 2 weeks ago
Exploiting Noisy Oracles with Bayesian Inference
7 months 2 weeks ago
Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges
7 months 2 weeks ago
Checked
31 minutes 22 seconds ago