NCC Group Research Blog
Cisco ASA series part two: Static analysis & datamining of Cisco ASA firmware
7 months 2 weeks ago
Cisco ASA series part seven: Checkheaps
7 months 2 weeks ago
Cisco ASA series part six: Cisco ASA mempools
7 months 2 weeks ago
Cisco ASA series part four: dlmalloc-2.8.x, libdlmalloc, & dlmalloc on Cisco ASA
7 months 2 weeks ago
Cisco ASA series part one: Intro to the Cisco ASA
7 months 2 weeks ago
Cisco ASA series part eight: Exploiting the CVE-2016-1287 heap overflow over IKEv1
7 months 2 weeks ago
Cisco ASA series part five: libptmalloc gdb plugin
7 months 2 weeks ago
Check out our new Microcorruption challenges!
7 months 2 weeks ago
Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
7 months 2 weeks ago
Chrome Password Manager Cross Origin Weakness
7 months 2 weeks ago
CertPortal: Building Self-Service Secure S/MIME Provisioning Portal
7 months 2 weeks ago
Chafer backdoor analysis
7 months 2 weeks ago
CERT C Secure Coding Standard
7 months 2 weeks ago
CERT Oracle Secure Coding Standard for Java
7 months 2 weeks ago
CECSTeR
7 months 2 weeks ago
Celebrating NCC Con Europe 2018
7 months 2 weeks ago
Call Map: A Tool for Navigating Call Graphs in Python
7 months 2 weeks ago
Car Parking Apps Vulnerable To Hacks
7 months 2 weeks ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
7 months 2 weeks ago
Checked
5 hours 8 minutes ago