NCC Group Research Blog
Sharkbot is back in Google Play
7 months 3 weeks ago
SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store
7 months 3 weeks ago
Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark
7 months 3 weeks ago
Setting a New Standard for Kubernetes Deployments
7 months 3 weeks ago
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
7 months 3 weeks ago
Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond
7 months 3 weeks ago
Self-Driving Cars- The future is now…
7 months 3 weeks ago
Security impact of IoT on the Enterprise
7 months 3 weeks ago
Security of Things: An Implementer’s Guide to Cyber Security for Internet of Things Devices and Beyond
7 months 3 weeks ago
Security Considerations of zk-SNARK Parameter Multi-Party Computation
7 months 3 weeks ago
Security First Umbrella
7 months 3 weeks ago
Security Best Practice: Host Naming & URL Conventions
7 months 3 weeks ago
Security Code Review With ChatGPT
7 months 3 weeks ago
Security Compliance as an Engineering Discipline
7 months 3 weeks ago
Securing Teradata Database
7 months 3 weeks ago
Securing the continuous integration process
7 months 3 weeks ago
SecureIE.ActiveX
7 months 3 weeks ago
Securing Google Cloud Platform – Ten best practices
7 months 3 weeks ago
Securing PL/SQL Applications with DBMS_ASSERT
7 months 3 weeks ago
Checked
36 minutes 47 seconds ago