NCC Group Research Blog
Cisco ASA series part eight: Exploiting the CVE-2016-1287 heap overflow over IKEv1
6 months 3 weeks ago
Cisco ASA series part five: libptmalloc gdb plugin
6 months 3 weeks ago
Check out our new Microcorruption challenges!
6 months 3 weeks ago
Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
6 months 3 weeks ago
Chrome Password Manager Cross Origin Weakness
6 months 3 weeks ago
CertPortal: Building Self-Service Secure S/MIME Provisioning Portal
6 months 3 weeks ago
Chafer backdoor analysis
6 months 3 weeks ago
CERT C Secure Coding Standard
6 months 3 weeks ago
CERT Oracle Secure Coding Standard for Java
6 months 3 weeks ago
CECSTeR
6 months 3 weeks ago
Celebrating NCC Con Europe 2018
6 months 3 weeks ago
Call Map: A Tool for Navigating Call Graphs in Python
6 months 3 weeks ago
Car Parking Apps Vulnerable To Hacks
6 months 3 weeks ago
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
6 months 3 weeks ago
C Language Standards Update – Zero-size Reallocations are Undefined Behavior
6 months 3 weeks ago
Bypassing Android’s Network Security Configuration
6 months 3 weeks ago
Bypassing Oracle DBMS_ASSERT (in certain situations)
6 months 3 weeks ago
Building WiMap the Wi-Fi Mapping Drone (1)
6 months 3 weeks ago
Business Insights: Cyber Security in the Financial Sector
6 months 3 weeks ago
Checked
5 hours 52 minutes ago