NCC Group Research Blog
Deception Engineering: exploring the use of Windows Service Canaries against ransomware
4 months 2 weeks ago
Database Servers on Windows XP and the unintended consequences of simple file sharing
4 months 2 weeks ago
DDoS Common Approaches and Failings
4 months 2 weeks ago
Deception Engineering: exploring the use of Windows Installer Packages against first stage payloads
4 months 2 weeks ago
Database Security Brief: The Oracle Critical Patch Update for April 2007
4 months 2 weeks ago
Database Security: A Christmas Carol
4 months 2 weeks ago
Data-mining with SQL Injection and Inference
4 months 2 weeks ago
DataArmor Full Disk Encryption 3.0.12c – Restricted Environment breakout, Privilege Escalation and Full Disk Decryption
4 months 2 weeks ago
Dangers of Kubernetes IAM Integrations
4 months 2 weeks ago
Dangling Cursor Snarfing: A New Class of Attack in Oracle
4 months 2 weeks ago
DARPA OnStar Vulnerability Analysis
4 months 2 weeks ago
D0nut encrypt me, I have a wife and no backups
4 months 2 weeks ago
Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG
4 months 2 weeks ago
D-LINK DIR-850L web admin interface vulnerable to stack-based buffer overflow
4 months 2 weeks ago
D-Link routers vulnerable to Remote Code Execution (RCE)
4 months 2 weeks ago
CyberVillainsCA
4 months 2 weeks ago
Cyber Security of New Space Paper
4 months 2 weeks ago
Cyber red-teaming business-critical systems while managing operational risk
4 months 2 weeks ago
Cyber Security in UK Agriculture
4 months 2 weeks ago
Checked
3 hours 40 minutes ago