NCC Group Research Blog
Game Security
4 months 2 weeks ago
General Data Protection Regulation – are you ready?
4 months 2 weeks ago
Fuzzing USB devices using Frisbee Lite
4 months 2 weeks ago
Fuzzing RTSP to discover an exploitable vulnerability in VLC
4 months 2 weeks ago
Fuzzing the Easy Way Using Zulu
4 months 2 weeks ago
Fuzzing the Easy Way Using Zulu (1)
4 months 2 weeks ago
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
4 months 2 weeks ago
Fuzzbox
4 months 2 weeks ago
FrisbeeLite
4 months 2 weeks ago
From CSV to CMD to qwerty
4 months 2 weeks ago
FPGAs: Security Through Obscurity?
4 months 2 weeks ago
Freddy: An extension for automatically identifying deserialisation issues in Java and .NET applications
4 months 2 weeks ago
Flubot: the evolution of a notorious Android Banking Malware
4 months 2 weeks ago
Forensic Fuzzing Tools
4 months 2 weeks ago
Fix Bounty
4 months 2 weeks ago
Flash local-with-filesystem Bypass in navigateToURL
4 months 2 weeks ago
Flash security restrictions bypass: File upload by URLRequest
4 months 2 weeks ago
firstexecution
4 months 2 weeks ago
Five Essential Machine Learning Security Papers
4 months 2 weeks ago
Checked
2 hours 19 minutes ago