NCC Group Research Blog
Oracle 11g TNS listener remote Null Pointer Dereference
6 months 3 weeks ago
Oracle E-Business Suite Pre-Auth SQLi with DBA Privileges
6 months 3 weeks ago
Oracle 11g TNS listener remote Invalid Pointer Read
6 months 3 weeks ago
Optimizing Pairing-Based Cryptography: Montgomery Multiplication in Assembly
6 months 3 weeks ago
Optimum Routers: Researching Managed Routers
6 months 3 weeks ago
Open Banking: Security considerations & potential risks
6 months 3 weeks ago
Optimizing Pairing-Based Cryptography: Montgomery Arithmetic in Rust
6 months 3 weeks ago
On the Use of Pedersen Commitments for Confidential Payments
6 months 3 weeks ago
Online Casino Roulette – A guideline for penetration testers and security researchers
6 months 3 weeks ago
On Linux’s Random Number Generation
6 months 3 weeks ago
On Multiplications with Unsaturated Limbs
6 months 3 weeks ago
On the malicious use of large language models like GPT-3
6 months 3 weeks ago
NX Server for Linux Arbitrary Files can be read with root privileges
6 months 3 weeks ago
OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel
6 months 3 weeks ago
Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP
6 months 3 weeks ago
North Korea’s Lazarus: their initial access trade-craft using social media and social engineering
6 months 3 weeks ago
NSA & CISA Kubernetes Security Guidance – A Critical Review
6 months 3 weeks ago
Non-Deterministic Nature of Prompt Injection
6 months 3 weeks ago
Non-flood/non-volumetric Distributed Denial of Service (DDoS)
6 months 3 weeks ago
Checked
1 hour 43 minutes ago