NCC Group Research Blog
Local network compromise despite good patching
6 months 3 weeks ago
log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
6 months 3 weeks ago
libtalloc: A GDB plugin for analysing the talloc heap
6 months 3 weeks ago
Lights, Camera, HACKED! An insight into the world of popular IP Cameras
6 months 3 weeks ago
Lessons learned from 50 USB bugs
6 months 3 weeks ago
LibAVCodec AMV Out of Array Write
6 months 3 weeks ago
Lessons learned from 50 bugs: Common USB driver vulnerabilities
6 months 3 weeks ago
Lending a hand to the community – Covenant v0.7 Updates
6 months 3 weeks ago
LDAPFragger: Bypassing network restrictions using LDAP attributes
6 months 3 weeks ago
LeaPFRogging PFR Implementations
6 months 3 weeks ago
LAPSUS$: Recent techniques, tactics and procedures
6 months 3 weeks ago
Latest threats to the connected car & intelligent transport ecosystem
6 months 3 weeks ago
Launching the first in our series of Research Insights
6 months 3 weeks ago
Kubernetes Security: Consider Your Threat Model
6 months 3 weeks ago
lapith
6 months 3 weeks ago
Kerberos Resource-Based Constrained Delegation: When an Image Change Leads to a Privilege Escalation
6 months 3 weeks ago
Kivlad
6 months 3 weeks ago
Java RMI Registry.bind() Unvalidated Deserialization
6 months 3 weeks ago
Java Web Start File Inclusion via System Properties Override
6 months 3 weeks ago
Checked
3 hours 7 minutes ago