NCC Group Research Blog
Does TypeScript Offer Security Improvements Over JavaScript?
7 months 2 weeks ago
Distributed Ledger (Blockchain) Security and Quantum Computing Implications
7 months 2 weeks ago
DNS Pinning and Web Proxies
7 months 2 weeks ago
Disclosure Policy
7 months 2 weeks ago
Discovering Smart Contract Vulnerabilities with GOATCasino
7 months 2 weeks ago
Dissecting social engineering attacks
7 months 2 weeks ago
DIBF – Updated
7 months 2 weeks ago
Disabling Office Macros to Reduce Malware Infections
7 months 2 weeks ago
Developing Secure Mobile Applications for Android
7 months 2 weeks ago
Detection Engineering for Kubernetes clusters
7 months 2 weeks ago
Detecting Mimikatz with Busylight
7 months 2 weeks ago
Detecting Rclone – An Effective Tool for Exfiltration
7 months 2 weeks ago
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
7 months 2 weeks ago
Detecting Karakurt – an extortion focused threat actor
7 months 2 weeks ago
Detecting and Hunting for the PetitPotam NTLM Relay Attack
7 months 2 weeks ago
Detecting and Protecting when Remote Desktop Protocol (RDP) is open to the Internet
7 months 2 weeks ago
Detecting anomalous Vectored Exception Handlers on Windows
7 months 2 weeks ago
Derusbi: A Case Study in Rapid Capability Development
7 months 2 weeks ago
Detecting and Hunting for the Malicious NetFilter Driver
7 months 2 weeks ago
Checked
6 hours 30 minutes ago