NCC Group Research Blog
Mergers & Acquisitions (M&A) cyber security due diligence
6 months 3 weeks ago
Medium Risk Vulnerability in Symantec Enterprise Security Management
6 months 3 weeks ago
Medium Risk Vulnerability in Symantec Network Access Control
6 months 3 weeks ago
Memory Gap
6 months 3 weeks ago
McAfee Email and Web Security Appliance v5.6 – Session hijacking (and bypassing client-side session timeouts)
6 months 3 weeks ago
Medical Devices: A Hardware Security Perspective
6 months 3 weeks ago
McAfee Email and Web Security Appliance v5.6 – Arbitrary file download is possible with a crafted URL, when logged in as any user
6 months 3 weeks ago
McAfee Email and Web Security Appliance v5.6 – Password hashes can be recovered from a system backup and easily cracked
6 months 3 weeks ago
McAfee Email and Web Security Appliance v5.6 – Active session tokens of other users are disclosed within the UI
6 months 3 weeks ago
McAfee Email and Web Security Appliance v5.6 – Any logged-in user can bypass controls to reset passwords of other administrators
6 months 3 weeks ago
McAfee Email and Web Security Appliance Reflective XSS allowing an attacker to gain session tokens
6 months 3 weeks ago
McAfee Email and Web Security Appliance Session hijacking and bypassing client-side session timeouts
6 months 3 weeks ago
McAfee Email and Web Security Appliance Arbitrary file download is possible with a crafted URL, when logged in as any user
6 months 3 weeks ago
McAfee Email and Web Security Appliance Password hashes can be recovered from a system backup and easily cracked
6 months 3 weeks ago
McAfee Email and Web Security Appliance Any logged-in user can bypass controls to reset passwords of other administrators
6 months 3 weeks ago
Mature Security Testing Framework
6 months 3 weeks ago
McAfee Email and Web Security Appliance Active session tokens of other users are disclosed within the UI
6 months 3 weeks ago
Maritime Cyber Security: Threats and Opportunities
6 months 3 weeks ago
Matty McMattface: Security implications, mitigations & testing strategies for biometric facial recognition systems
6 months 3 weeks ago
Checked
50 minutes 13 seconds ago