NCC Group Research Blog
An Introduction to Authenticated Encryption
7 months 2 weeks ago
An Adventure in Contingency Debugging: Ruby IO#read/IO#write Considered Harmful
7 months 2 weeks ago
An adventure in PoEKmon NeutriGo land
7 months 2 weeks ago
Alternative Approaches for Fault Injection Countermeasures (Part 3/3)
7 months 2 weeks ago
An Adaptive-Ciphertext Attack Against “I ⊕ C” Block Cipher Modes With an Oracle
7 months 2 weeks ago
Advice for security decision makers contemplating the value of Antivirus
7 months 2 weeks ago
Advisory-CraigSBlackie-CVE-2016-9795
7 months 2 weeks ago
Adventures in Xen Exploitation
7 months 2 weeks ago
Adversarial Machine Learning: Approaches & defences
7 months 2 weeks ago
Adventures in Windows Driver Development: Part 1
7 months 2 weeks ago
Advanced SQL Injection in SQL Server Applications
7 months 2 weeks ago
Adventures in the land of BumbleBee – a new malicious loader
7 months 2 weeks ago
Adobe Flash Player Cross Domain Policy Bypass
7 months 2 weeks ago
Adobe flash sandbox bypass to navigate to local drives
7 months 2 weeks ago
Advanced Exploitation of Oracle PL/SQL Flaws
7 months 2 weeks ago
Accessing Private Fields Outside of Classes in Java
7 months 2 weeks ago
Adobe Acrobat Reader XML Forms Data Format Buffer Overflow
7 months 2 weeks ago
Abusing Blu-ray Players Part 1 – Sandbox Escapes
7 months 2 weeks ago
Abusing Privileged and Unprivileged Linux Containers
7 months 2 weeks ago
Checked
5 hours 4 minutes ago