NCC Group Research Blog
Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability
4 months 2 weeks ago
Understanding cyber risk management vs uncertainty with confidence in 2017
4 months 2 weeks ago
Understanding and Hardening Linux Containers
4 months 2 weeks ago
Unauthenticated XML eXternal Entity (XXE) vulnerability
4 months 2 weeks ago
UK government cyber security guidelines for connected & autonomous vehicles
4 months 2 weeks ago
umap
4 months 2 weeks ago
typofinder
4 months 2 weeks ago
U plug, we play
4 months 2 weeks ago
Trusted Gateway
4 months 2 weeks ago
Turla PNG Dropper is back
4 months 2 weeks ago
tybocer
4 months 2 weeks ago
Trust in the Internet Survey
4 months 2 weeks ago
Trust in the New Internet Survey
4 months 2 weeks ago
TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus
4 months 2 weeks ago
Tracking a P2P network related to TA505
4 months 2 weeks ago
Toxic Tokens: Using UUIDs for Authorization is Dangerous (even if they’re cryptographically random)
4 months 2 weeks ago
TPM Genie
4 months 2 weeks ago
Tor Browser Research Report Released
4 months 2 weeks ago
Tool: WStalker – an easy proxy to support Web API assessments
4 months 2 weeks ago
Checked
5 hours 52 minutes ago