NCC Group Research Blog
Analysing a recent Poison Ivy sample
4 months 2 weeks ago
An Introduction to Quantum Computing for Security Professionals
4 months 2 weeks ago
An Introduction to Ultrasound Security Research
4 months 2 weeks ago
An Introduction to Fault Injection (Part 1/3)
4 months 2 weeks ago
An Introduction to Heap overflows on AIX 5.3L
4 months 2 weeks ago
An Analysis of Mobile Geofencing App Security
4 months 2 weeks ago
An Illustrated Guide to Elliptic Curve Cryptography Validation
4 months 2 weeks ago
An Introduction to Authenticated Encryption
4 months 2 weeks ago
An Adventure in Contingency Debugging: Ruby IO#read/IO#write Considered Harmful
4 months 2 weeks ago
An adventure in PoEKmon NeutriGo land
4 months 2 weeks ago
Alternative Approaches for Fault Injection Countermeasures (Part 3/3)
4 months 2 weeks ago
An Adaptive-Ciphertext Attack Against “I ⊕ C” Block Cipher Modes With an Oracle
4 months 2 weeks ago
Advice for security decision makers contemplating the value of Antivirus
4 months 2 weeks ago
Advisory-CraigSBlackie-CVE-2016-9795
4 months 2 weeks ago
Adventures in Xen Exploitation
4 months 2 weeks ago
Adversarial Machine Learning: Approaches & defences
4 months 2 weeks ago
Adventures in Windows Driver Development: Part 1
4 months 2 weeks ago
Advanced SQL Injection in SQL Server Applications
4 months 2 weeks ago
Adventures in the land of BumbleBee – a new malicious loader
4 months 2 weeks ago
Checked
3 hours 35 minutes ago