NCC Group Research Blog
How organisations can properly configure SSL services to ensure the integrity and confidentiality of data in transit
4 months 2 weeks ago
How to Backdoor Diffie-Hellman
4 months 2 weeks ago
How to protect yourself & your organisation from phishing attacks
4 months 2 weeks ago
How Microsoft Office knows a document came from the Internet and might be dangerous
4 months 2 weeks ago
How much training should staff have on cyber security?
4 months 2 weeks ago
House
4 months 2 weeks ago
How cryptography is used to monitor the spread of COVID-19
4 months 2 weeks ago
How I did not get a shell
4 months 2 weeks ago
HITBAMS – Your Not so “Home” Office – Soho Hacking at Pwn2Own
4 months 2 weeks ago
hostresolver
4 months 2 weeks ago
HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack
4 months 2 weeks ago
HIDDEN COBRA Volgmer: A Technical Analysis
4 months 2 weeks ago
Helping Engineering Teams Tackle Security Debt in Embedded Systems: U-Boot Configuration Auditing Introduced in Depthcharge v0.2.0
4 months 2 weeks ago
Hiccupy
4 months 2 weeks ago
Heartbleed (CVE-2014-0160) Advisory
4 months 2 weeks ago
Heartbleed OpenSSL vulnerability
4 months 2 weeks ago
HDMI – Hacking Displays Made Interesting
4 months 2 weeks ago
HDMI Ethernet Channel
4 months 2 weeks ago
Hardware Security By Design: ESP32 Guidance
4 months 2 weeks ago
Checked
8 hours 14 minutes ago