NCC Group Research Blog
Social Engineering Penetration Testing
4 months 2 weeks ago
Sobelow Update
4 months 2 weeks ago
Sobelow: Static analysis for the Phoenix Framework
4 months 2 weeks ago
SOC maturity & capability
4 months 2 weeks ago
Sniffle: A Sniffer for Bluetooth 5
4 months 2 weeks ago
So long and thanks for all the 0day
4 months 2 weeks ago
Smuggling HTA files in Internet Explorer/Edge
4 months 2 weeks ago
SnapMC skips ransomware, steals data
4 months 2 weeks ago
Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
4 months 2 weeks ago
SmarterMail – Stored XSS in emails
4 months 2 weeks ago
SMB hash hijacking & user tracking in MS Outlook
4 months 2 weeks ago
SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
4 months 2 weeks ago
Signaturing an Authenticode anomaly with Yara
4 months 2 weeks ago
Singularity of Origin
4 months 2 weeks ago
Slotting Security into Corporate Development
4 months 2 weeks ago
Sifting through the spines: identifying (potential) Cactus ransomware victims
4 months 2 weeks ago
Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
4 months 2 weeks ago
Shocker
4 months 2 weeks ago
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
4 months 2 weeks ago
Checked
4 hours 17 minutes ago