NCC Group Research Blog
Black Hat 2013 – Bluetooth Smart Presentation Available
4 months 2 weeks ago
Best Practices for the use of Static Code Analysis within a Real-World Secure Development Lifecycle
4 months 2 weeks ago
Best practices with BYOD
4 months 2 weeks ago
Berserko: Kerberos Authentication for Burp Suite
4 months 2 weeks ago
BAT: a Fast and Small Key Encapsulation Mechanism
4 months 2 weeks ago
Batten down the hatches: Cyber threats facing DP operations
4 months 2 weeks ago
Back Office Web Administration Authentication Bypass
4 months 2 weeks ago
Azucar
4 months 2 weeks ago
Back in Black: Unlocking a LockBit 3.0 Ransomware Attack
4 months 2 weeks ago
AWS environment security assessment with Scout2
4 months 2 weeks ago
AWS Inventory: A tool for mapping AWS resources
4 months 2 weeks ago
Avoiding Pitfalls Developing with Electron
4 months 2 weeks ago
Automating extraction from malware and recent campaign analysis
4 months 2 weeks ago
AutoRepeater: Automated HTTP Request Repeating With Burp Suite
4 months 2 weeks ago
Autochrome
4 months 2 weeks ago
Automated enumeration of email filtering solutions
4 months 2 weeks ago
Automated Reverse Engineering of Relationships Between Data Structures in C++ Binaries
4 months 2 weeks ago
Aurora Response Recommendations
4 months 2 weeks ago
Authorisation
4 months 2 weeks ago
Checked
4 hours 37 minutes ago