NCC Group Research Blog
EDIDFuzzer
7 months 2 weeks ago
Elephant in the Boardroom Survey 2016
7 months 2 weeks ago
eBook: Breach notification under GDPR – How to communicate a personal data breach
7 months 2 weeks ago
eBPF Adventures: Fiddling with the Linux Kernel and Unix Domain Sockets
7 months 2 weeks ago
eBook – Planning a robust incident response process
7 months 2 weeks ago
eBook – Do you know how your organisation would react in a real-world attack scenario?
7 months 2 weeks ago
easyda
7 months 2 weeks ago
EasyDA – Easy Windows Domain Access Script
7 months 2 weeks ago
Early CCS Attack Analysis
7 months 2 weeks ago
earlyremoval, in the Conservatory, with the Wrench: Exploring Ghidra’s decompiler internals to make automatic P-Code analysis scripts
7 months 2 weeks ago
Dynamic Linq Injection Remote Code Execution Vulnerability (CVE-2023-32571)
7 months 2 weeks ago
E-mail Spoofing and CDONTS.NEWMAIL
7 months 2 weeks ago
Drones: Detect, Identify, Intercept, and Hijack
7 months 2 weeks ago
Drupal Vulnerability
7 months 2 weeks ago
dotnetpaddingoracle
7 months 2 weeks ago
dotnetpefuzzing
7 months 2 weeks ago
Double-odd Elliptic Curves
7 months 2 weeks ago
Domestic IoT Nightmares: Smart Doorbells
7 months 2 weeks ago
Don’t throw a hissy fit; defend against Medusa
7 months 2 weeks ago
Checked
7 hours 42 minutes ago