NCC Group Research Blog
Understanding Ransomware: Impact, Evolution and Defensive Strategies
9 months 1 week ago
Understanding Microsoft Word OLE Exploit Primitives
9 months 1 week ago
Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability
9 months 1 week ago
Understanding cyber risk management vs uncertainty with confidence in 2017
9 months 1 week ago
Understanding and Hardening Linux Containers
9 months 1 week ago
Unauthenticated XML eXternal Entity (XXE) vulnerability
9 months 1 week ago
UK government cyber security guidelines for connected & autonomous vehicles
9 months 1 week ago
umap
9 months 1 week ago
typofinder
9 months 1 week ago
U plug, we play
9 months 1 week ago
Trusted Gateway
9 months 1 week ago
Turla PNG Dropper is back
9 months 1 week ago
tybocer
9 months 1 week ago
Trust in the Internet Survey
9 months 1 week ago
Trust in the New Internet Survey
9 months 1 week ago
TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus
9 months 1 week ago
Tracking a P2P network related to TA505
9 months 1 week ago
Toxic Tokens: Using UUIDs for Authorization is Dangerous (even if they’re cryptographically random)
9 months 1 week ago
TPM Genie
9 months 1 week ago
Checked
7 hours 10 minutes ago