NCC Group Research Blog
Firmware Rootkits: The Threat to the Enterprise
4 months 2 weeks ago
File Fuzzers
4 months 2 weeks ago
Finding and Exploiting .NET Remoting over HTTP using Deserialisation
4 months 2 weeks ago
Fat-Finger
4 months 2 weeks ago
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
4 months 2 weeks ago
Extractor
4 months 2 weeks ago
Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
4 months 2 weeks ago
Extending a Thinkst Canary to become an interactive honeypot
4 months 2 weeks ago
External Enumeration and Exploitation of Email and Web Security Solutions
4 months 2 weeks ago
Extracting the Payload from a CVE-2014-1761 RTF Document
4 months 2 weeks ago
Exporting non-exportable RSA keys
4 months 2 weeks ago
Exposing Vulnerabilities in Media Software
4 months 2 weeks ago
Exploring Prompt Injection Attacks
4 months 2 weeks ago
Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
4 months 2 weeks ago
Exploring Verifiable Random Functions in Code
4 months 2 weeks ago
Exploring macOS Calendar Alerts: Part 2 – Exfiltrating data (CVE-2020-3882)
4 months 2 weeks ago
Exploring Overfitting Risks in Large Language Models
4 months 2 weeks ago
Exploring DeepFake Capabilities & Mitigation Strategies with University College London
4 months 2 weeks ago
Exploring macOS Calendar Alerts: Part 1 – Attempting to execute code
4 months 2 weeks ago
Checked
2 hours 36 minutes ago