NCC Group Research Blog
A Rendezvous with System Management Interrupts
1 week 6 days ago
Technical Advisory: Multiple Vulnerabilities in TCPDF
2 weeks 1 day ago
Security Tips For Your AI Cloud Infrastructure
2 weeks 5 days ago
Technical Advisory – Hash Denial-of-Service Attack in Multiple QUIC Implementations
3 weeks 1 day ago
Weak Passwords Led to (SafePay) Ransomware…Yet Again
3 weeks 1 day ago
NCC Group’s 2024 Annual Research Report
3 weeks 6 days ago
Analyzing Secure AI Architectures
1 month ago
Technical Advisory: Cross-Site Scripting in Umbraco Rich Text Display
1 month 3 weeks ago
Proxying PyRIT for fun and profit
1 month 4 weeks ago
Research Blog Test Playground
1 month 4 weeks ago
PMKID Attacks: Debunking the 802.11r Myth
2 months 2 weeks ago
Public Report: XMTP MLS Implementation Review
3 months ago
Phish Supper: An Incident Responder’s Bread and Butter
3 months ago
Analyzing Secure AI Design Principles
3 months 1 week ago
On Almost Signing Android Builds
3 months 1 week ago
Defending Your Directory: An Expert Guide to Mitigating Pass-the-Hash Attacks in Active Directory
3 months 3 weeks ago
Defending Your Directory: An Expert Guide to Fortifying Active Directory Against LDAP Injection Threats
3 months 4 weeks ago
Defending Your Directory: An Expert Guide to Fortifying Active Directory Certificate Services (ADCS) Against Exploitation
4 months ago
Public Report: eBPF Verifier Code Review
4 months ago
Checked
5 minutes 23 seconds ago