NCC Group Research Blog
Payment Card Industry Data Security Standard (PCI DSS) A Navigation and Explanation of Changes from v2.0 to v3.0
4 months 2 weeks ago
Past, Present and Future of Effective C
4 months 2 weeks ago
Password and brute-force mitigation policies
4 months 2 weeks ago
Passive Information Gathering – The Analysis of Leaked Network Security Information
4 months 2 weeks ago
Paradoxical Compression with Verifiable Delay Functions
4 months 2 weeks ago
Passive Decryption of Ethereum Peer-to-Peer Traffic
4 months 2 weeks ago
Pairing over BLS12-381, Part 3: Pairing!
4 months 2 weeks ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
4 months 2 weeks ago
Pairing over BLS12-381, Part 1: Fields
4 months 2 weeks ago
Pairing over BLS12-381, Part 2: Curves
4 months 2 weeks ago
Package Play
4 months 2 weeks ago
Padding the struct: How a compiler optimization can disclose stack memory
4 months 2 weeks ago
OSX afpserver remote code execution
4 months 2 weeks ago
Overview of Modern Memory Security Concerns
4 months 2 weeks ago
Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
4 months 2 weeks ago
OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
4 months 2 weeks ago
osquery Application Security Assessment Public Report
4 months 2 weeks ago
Order Details Screens and PII
4 months 2 weeks ago
OS X 10.6.6 Camera Raw Library Memory Corruption
4 months 2 weeks ago
Checked
2 hours 53 minutes ago