NCC Group Research Blog
Machine Learning for Static Analysis of Malware – Expansion of Research Scope
4 months 2 weeks ago
Machine Learning 103: Exploring LLM Code Generation
4 months 2 weeks ago
Lumension Device Control Remote Memory Corruption
4 months 2 weeks ago
Machine Learning 101: The Integrity of Image (Mis)Classification?
4 months 2 weeks ago
Machine Learning 102: Attacking Facial Authentication with Poisoned Data
4 months 2 weeks ago
LTair: The LTE Air Interface Tool
4 months 2 weeks ago
Lumension Device Control (formerly Sanctuary) remote memory corruption
4 months 2 weeks ago
Login Service Security
4 months 2 weeks ago
Logs, Logs, the Audit Trail – Features of a Successful Log Management Solution
4 months 2 weeks ago
Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel
4 months 2 weeks ago
Log4Shell: Reconnaissance and post exploitation network detection
4 months 2 weeks ago
Live Incident Blog: June Global Ransomware Outbreak
4 months 2 weeks ago
Local network compromise despite good patching
4 months 2 weeks ago
log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
4 months 2 weeks ago
libtalloc: A GDB plugin for analysing the talloc heap
4 months 2 weeks ago
Lights, Camera, HACKED! An insight into the world of popular IP Cameras
4 months 2 weeks ago
Lessons learned from 50 USB bugs
4 months 2 weeks ago
LibAVCodec AMV Out of Array Write
4 months 2 weeks ago
Lessons learned from 50 bugs: Common USB driver vulnerabilities
4 months 2 weeks ago
Checked
4 hours 32 minutes ago