NCC Group Research Blog
LDAPFragger: Bypassing network restrictions using LDAP attributes
4 months 2 weeks ago
LeaPFRogging PFR Implementations
4 months 2 weeks ago
LAPSUS$: Recent techniques, tactics and procedures
4 months 2 weeks ago
Latest threats to the connected car & intelligent transport ecosystem
4 months 2 weeks ago
Launching the first in our series of Research Insights
4 months 2 weeks ago
Kubernetes Security: Consider Your Threat Model
4 months 2 weeks ago
lapith
4 months 2 weeks ago
Kerberos Resource-Based Constrained Delegation: When an Image Change Leads to a Privilege Escalation
4 months 2 weeks ago
Kivlad
4 months 2 weeks ago
Java RMI Registry.bind() Unvalidated Deserialization
4 months 2 weeks ago
Java Web Start File Inclusion via System Properties Override
4 months 2 weeks ago
Jenkins Plugins and Core Technical Summary Advisory
4 months 2 weeks ago
Jailbreak, updated and open-sourced
4 months 2 weeks ago
Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs
4 months 2 weeks ago
Jackson Deserialization Vulnerabilities
4 months 2 weeks ago
Jailbreak
4 months 2 weeks ago
ISM RAT
4 months 2 weeks ago
Ivanti Zero Day – Threat Actors observed leveraging CVE-2021-42278 and CVE-2021-42287 for quick privilege escalation to Domain Admin
4 months 2 weeks ago
iSEC reviews SecureDrop
4 months 2 weeks ago
Checked
2 minutes 42 seconds ago