NCC Group Research Blog
Passive Decryption of Ethereum Peer-to-Peer Traffic
7 months 4 weeks ago
Pairing over BLS12-381, Part 3: Pairing!
7 months 4 weeks ago
Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
7 months 4 weeks ago
Pairing over BLS12-381, Part 1: Fields
7 months 4 weeks ago
Pairing over BLS12-381, Part 2: Curves
7 months 4 weeks ago
Package Play
7 months 4 weeks ago
Padding the struct: How a compiler optimization can disclose stack memory
7 months 4 weeks ago
OSX afpserver remote code execution
7 months 4 weeks ago
Overview of Modern Memory Security Concerns
7 months 4 weeks ago
Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
7 months 4 weeks ago
OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
7 months 4 weeks ago
osquery Application Security Assessment Public Report
7 months 4 weeks ago
Order Details Screens and PII
7 months 4 weeks ago
OS X 10.6.6 Camera Raw Library Memory Corruption
7 months 4 weeks ago
Oracle Retail Integration Bus Manager Directory Traversal
7 months 4 weeks ago
Oracle Retail Invoice Manager SQL Injection
7 months 4 weeks ago
Oracle Hyperion 11 Directory Traversal
7 months 4 weeks ago
Oracle Java Installer Adds a System Path Which is Writable by All
7 months 4 weeks ago
Oracle Passwords and OraBrute
7 months 4 weeks ago
Checked
3 hours ago