NCC Group Research Blog
Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG
6 months 3 weeks ago
D-LINK DIR-850L web admin interface vulnerable to stack-based buffer overflow
6 months 3 weeks ago
D-Link routers vulnerable to Remote Code Execution (RCE)
6 months 3 weeks ago
CyberVillainsCA
6 months 3 weeks ago
Cyber Security of New Space Paper
6 months 3 weeks ago
Cyber red-teaming business-critical systems while managing operational risk
6 months 3 weeks ago
Cyber Security in UK Agriculture
6 months 3 weeks ago
CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF) – Part 2
6 months 3 weeks ago
Cyber Essentials Scheme
6 months 3 weeks ago
CVE-2019-1405 and CVE-2019-1322 – Elevation to SYSTEM via the UPnP Device Host Service and the Update Orchestrator Service
6 months 3 weeks ago
CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF) – Part 1
6 months 3 weeks ago
CVE-2018-8611 Exploiting Windows KTM Part 3/5 – Triggering the race condition and debugging tricks
6 months 3 weeks ago
CVE-2018-8611 Exploiting Windows KTM Part 4/5 – From race win to kernel read and write primitive
6 months 3 weeks ago
CVE-2018-8611 Exploiting Windows KTM Part 5/5 – Vulnerability detection and a better read/write primitive
6 months 3 weeks ago
CVE-2018-8611 Exploiting Windows KTM Part 1/5 – Introduction
6 months 3 weeks ago
CVE-2018-8611 Exploiting Windows KTM Part 2/5 – Patch analysis and basic triggering
6 months 3 weeks ago
Curve9767 and Fast Signature Verification
6 months 3 weeks ago
CVE-2017-8570 RTF and the Sisfader RAT
6 months 3 weeks ago
CVE-2018-8611 – Diving into the Windows Kernel Transaction Manager (KTM) for fun and exploitation
6 months 3 weeks ago
Checked
9 hours 21 minutes ago