• Open

    Elastic Workflows GA: automation where your security data already lives
    Elastic Workflows is generally available in 9.4, bringing production-ready security automation with deeper case management integration, human-in-the-loop support, natural language authoring, and more.  ( 22 min )

  • Open

    Microsoft 365 Backup: Restore individual files and folders with granular restore
    Microsoft 365 Backup now lets you recover individual files and folders from SharePoint and OneDrive backups without rolling back an entire site or account. This granular restore feature became generally available in late April 2026. You need the SharePoint Backup Administrator role to use it, and the service charges $0.15 per GB per month for protected data. This article explains how the feature works, its limitations, and how to perform a restore. Source
  • Open

    Red Canary CFP tracker: May 2026
    Red Canary's monthly roundup of upcoming security conferences and call for papers (CFP) submission deadlines May 2026  ( 25 min )
  • Open

    Practical Package Security: The Unofficial Guide
    Get actionable best practices to shrink your attack surface, protect execution environments, control package ingestion, and catch compromises early.  ( 56 min )
    From Foundation to Force: Your Guide to Operationalizing Wiz at Scale
    Following your foundation, operationalize Wiz across development, detection and response, and program maturity so your security program never stops getting stronger.  ( 57 min )
    Meet Wiz for M365: Bringing SaaS into the Security Graph
    Secure Microsoft 365 and the cloud it powers — one platform, one graph, complete context.  ( 54 min )
  • Open

    Copirate 365 at DEF CON: Plundering in the Depths of Microsoft Copilot (CVE-2026-24299)
    This is a writeup of my DEF CON Singapore talk that walks through vulnerabilities and exploits in M365 Copilot and Consumer Copilot. I disclosed these to Microsoft last year. MSRC assigned CVE-2026-24299 and the issues are now patched. Contents This turned out to be a long post, covering the 45 minute talk. I added an index page, so you know what’s in here. The talk had a more demos by the way, but I included videos here in this post also.  ( 12 min )
  • Open

    Azure Hacking: New Cloudfoxable Challenges
    Cloudfoxable started as a hands-on AWS security training tool. Now it's expanding. Bishop Fox has launched the first set of Azure challenges, giving security professionals a safe, intentionally misconfigured environment to explore identity-driven attack paths and privilege escalation in Azure.  ( 7 min )
  • Open

    From plain English to production rule: AI-native Elasticsearch ES|QL detection in Elastic Security
    Elastic Security now lets analysts describe a threat behavior in plain language and receive a complete, validated Elasticsearch ES|QL detection rule in return, no query expertise required.  ( 28 min )
    Elastic Conversational Entity Analytics: threat hunting in a single conversation
    Conversational Entity Analytics delivers Entity Analytics features as rich inline attachments and Canvas previews into Agent Builder, so you don’t have to leave the conversation.
    One agent, the right skills: Elastic Security 9.4 brings domain expertise on demand to every SOC workflow
    Elastic Security 9.4 introduces skills, modular AI capabilities that teach the Elastic AI Agent how to detect, investigate, and hunt like a specialist. This is how they work, and why they matter for the SOC.

  • Open

    Exchange Online Change Optics Report: spot mail flow problems before they hit
    Microsoft has released the Change Optics Report in public preview for Exchange Online. This new report, available in the Exchange Admin Center (EAC), identifies emails in your tenant that will be affected when Microsoft enforces an upcoming service change — before the change takes effect. Currently, it covers two scenarios: outbound mail sent from your default onmicrosoft.com domain, and incoming Direct Send traffic. This article explains what the report shows, how to access it, and what steps to take for each scenario. Source
  • Open

    Copy Fail: Universal Linux Local Privilege Escalation Vulnerability
    Detect and mitigate Copy Fail (CVE-2026-31431), an easily exploitable vulnerability in the Linux kernel that allows escalation from an unprivileged local user account to root access.  ( 52 min )
  • Open

    Overview of Content Published in April
    Here is an overview of content I published in April: Blog posts: Update: cut-bytes.py Version 0.0.18 SANS ISC Diary entries: A .WAV With A Payload  ( 11 min )
  • Open

    3 ways custom scan checks turn practitioner knowledge into scalable automation
    Senior pentesters have a deeply refined intuition about what is vulnerable in an environment. The problem? That expertise is often siloed with an individual and trapped in their notes or Python scripts.  ( 7 min )
  • Open

    DFIR: From alert to root cause using Osquery without leaving Elastic Security
    Learn how to perform distributed, real-time Digital Forensics and Incident Response (DFIR) using Osquery and Elastic to investigate threats at scale without relying on disk imaging.  ( 29 min )

  • Open

    Windows Server 2025 in-place upgrade via Windows Update: prerequisites, steps, and limits
    Starting in mid-April 2026, Microsoft allows you to upgrade Windows Server 2019 and Windows Server 2022 directly to Windows Server 2025 through Windows Update — no installation media (ISO file or DVD) required. The process is called an in-place upgrade, meaning your installed applications, settings, and server roles remain unchanged while only the operating system version changes. This article covers the prerequisites, the exact registry change you need to make, the step-by-step procedure for both the graphical desktop and the text-only Server Core installation, and the important cases where you must not use this method. Source
  • Open

    Red Agent and Claude Opus: Securing Production Targets at Scale
    Delivering enterprise-grade continuous AI-powered risk assessment to hundreds of customers through the combined power of Wiz and Anthropic  ( 51 min )
    The (In)security Landscape of AI-Powered GitHub Actions (Part 2/2)
    When AI meets CI/CD: permission bypasses, prompt injection, and what to do about it.  ( 62 min )
  • Open

    Introducing AIMap: Security Testing For AI Agent Infrastructure
    Attackers can already find, connect to, and probe your exposed AI agent infrastructure. AIMap gives defenders that same visibility. Built by Bishop Fox, this open-source tool discovers, scores, and tests exposed AI endpoints so you can understand your real attack surface before someone else does.  ( 9 min )

  • Open

    Key Takeaways from the 2026 State of AI in the Cloud Report
    How AI Adoption, Autonomy, and Attacker Innovation Are Reshaping Cloud Security  ( 53 min )
    Supply Chain Campaign Targets SAP npm Packages with Credential-Stealing Malware
    Detect and mitigate malicious npm packages linked to the recent Shai-Hulud-style campaign - Mini Shai Hulud.  ( 54 min )
    Wiz Code Week Recap: Securing AI Native Development
    Providing Application Security teams with visibility and guardrails to secure agentic software development and the modern software supply chain  ( 54 min )
    Modern Defensible Architecture: Resilience for the Australian Federal Government
    How Wiz enables Australian government agencies to operationalise MDA with real-time context, zero trust enforcement, and end-to-end cloud visibility.  ( 54 min )
  • Open

    Windows 365 Reserve: user-initiated Cloud PC provisioning
    Windows 365 Reserve is Microsoft's short-term Cloud PC solution for users whose primary physical device becomes unavailable. Since its general availability in December 2025, only IT admins could provision these Cloud PCs through Microsoft Intune. A public preview announced on April 28, 2026 adds an optional setting that lets users start the provisioning process themselves from the Windows App, without waiting for IT intervention. Source
    Copilot agentic AI in Outlook: automating inbox and calendar management
    Microsoft announced agentic features for Copilot in Outlook, expanding from single-task assistance to continuous, multi-step automation of email and calendar work. These features let Copilot act independently on your behalf — prioritizing messages, drafting follow-ups, responding to meeting invites, and resolving scheduling conflicts. Access is currently limited to Microsoft's Frontier early-access program and requires a Microsoft 365 Copilot license. This article explains what the new features do, what your infrastructure must look like, and how you enable access as an administrator. Source
  • Open

    Introducing the redesigned Mac threat prevention. Now available in beta.
    The beta release of Mac threat prevention simplifies how Jamf admins can defend their Mac fleets.  ( 7 min )
  • Open

    The Internet Is Falling Down, Falling Down, Falling Down (cPanel & WHM Authentication Bypass CVE-2026-41940)
    Hello! Yes, it's all a disaster again! Let's get this party started: 0:00 0:12 1× No comments today, so imagine this: We wrote something that we find very funny, Nobody else gets it, But everyone humors us Just like a typical watchTowr Labs  ( 14 min )
  • Open

    How AI can streamline your security testing
    Atomic Red Team’s new MCP server helps you test more, faster as you validate your detection coverage against MITRE ATT&CK techniques  ( 29 min )
  • Open

    Extending Ruzzy with LibAFL
    LibAFL is all the rage in the fuzzing community these days, especially with LLVM’s libFuzzer being placed in maintenance mode. Written in Rust, LibAFL claims improved performance, modularity, state-of-the-art fuzzing techniques, and libFuzzer compatibility. For these reasons, I set out to add LibAFL support to Ruzzy, our coverage-guided fuzzer for pure Ruby code and Ruby C extensions. This gives Ruby developers and security researchers access to a more advanced and actively maintained fuzzing engine without changing how they write their fuzzing harnesses. Ruzzy was originally built on top of LLVM’s libFuzzer, so using LibAFL’s compatibility layer should be easy enough. However, digging around in the internals of complex systems is never quite as simple as it seems. In this post, I will inv…  ( 9 min )
  • Open

    Mac Malware of 2017
    Let's look at all the mac malware from 2017, for each - discussing their infection vector, persistence mechanism, features & goals.  ( 40 min )
    Building HackingTeam's OS X Implant For Fun & Profit
    How to build HackingTeam's OS X implant in Xcode  ( 42 min )
    Reversing to Engineer: Learning to 'Secure' XPC from a Patch
    How reversing Apple's 'RootPipe' patch provided the means to secure TaskExplorer's XPC service  ( 42 min )
    Monitoring Process Creation via the Kernel (Part I)
    Why BlockBlock needs a kext (hint: process monitoring), and how the kext was created  ( 42 min )
    Phoenix: RootPipe lives! ...even on OS X 10.10.3
    Exploiting RootPipe on OS X 10.10.3  ( 42 min )
    Website Launch
    NSLog(@"Hello World"); objective-see.org is alive!  ( 42 min )
    Writing a Process Monitor with Apple's Endpoint Security Framework
    Learn how to leverage Apple's new Endpoint Security Framework to create a comprehensive (user-mode) Process Monitor for macOS 10.15!  ( 14 min )
    The Mac Malware of 2019
    Our annual report on all the Mac malware of the year - including samples for download, infection vectors, persistence mechanisms, payloads and more!  ( 41 min )
    Kernel Debugging a Virtualized OS X El Capitan Image
    How to remotely kernel-debug a OS X 10.11 VM  ( 42 min )
    More on, "Adware for OS X Distributes Trojans"
    A deeper dive into 'MacInstaller' and the adware it installs  ( 42 min )
    CVE-2015-3673: Goodbye Rootpipe...(for now?)
    Details on bypassing Apple's original rootpipe patch  ( 42 min )
    Dylib Hijack Scanner Released
    Announcing the release of DHS; a tool to help detect (dylib) hijackers  ( 42 min )
    The Mac Malware of 2018
    Our annual report on all the Mac malware of the year - including samples for download, infection vectors, persistence mechanisms, payloads and more!  ( 26 min )
    Monitoring Process Creation via the Kernel (Part III)
    Getting process creation notifcations from kernel-mode to user-mode, via the undocumented kev_msg_post function  ( 8 min )
    HandBrake Hacked! OSX/Proton (re)Appears
    The website of a popular application was hacked, and the application trojaned with a new variant of osx/proton.  ( 3 min )
    HackingTeam Reborn; A Brief Analyis of the RCS Implant Installer
    HackingTeam using native OS X crypto to protect malware -neat! New blog w/ sample + decryptions/dumpings/detections  ( 5 min )
    OSX/MacRansom; analyzing the latest ransomware to target macs
    Looks like somebody on the 'dark web' is offering 'Ransomware as a Service'...that's designed to infect Macs!  ( 6 min )
    Forget the NSA, it's Shazam that's always listening!
    Does Shazam's Mac App keep recording even when you turn the app off? ...yes :/  ( 8 min )
    [0day] Bypassing Apple's System Integrity Protection
    Read how an attacker can bypass Apple's SIP, via the local OS upgrade process  ( 11 min )
    Ay MaMi - Analyzing a New macOS DNS Hijacker
    OSX/MaMi (the first Mac malware of 2018) hijacks infected users' DNS settings and installs a malicious certificate into the System keychain, in order to give remote attackers 'access' to all network traffic  ( 9 min )
    A Deceitful 'Doctor' in the Mac App Store
    A massively popular app from the official Mac App Store, surreptitiously steals your browsing history! By fully reversing the application, we can fully expose its functionality and rather shady capabilities.  ( 13 min )
    'Untranslocating' an App
    Apple's App Translocation broke several of my tools, but we can locally undo it to restore broken functionality!  ( 11 min )
    Analyzing the Anti-Analysis Logic of an Adware Installer
    Dissecting string obfuscations, junk code insertions, and anti-debugging logic of InstallCore  ( 5 min )
    Persisting via a Finder Sync
    Learn how a Finder Sync can 'extend' Finder.app and how this could be abused for persistence  ( 5 min )
    New Attack, Old Tricks
    A Word document targets Mac users with malicious macros and an open-source payload.  ( 4 min )
    Are you from the Mac App Store?
    How to verify that an application came from the official Mac App Store, via receipt validation  ( 7 min )
    An Insecurity in Apple's Security Framework?
    Turns out that writing security tools is a great way to inadvertently uncover bugs in macOS. How about a crash in Apple's 'Security' framework ... that can't be good!?  ( 7 min )
    Towards Generic Ransomware Detection
    By monitoring file I/O events and detecting the rapid creation of encrypted files by untrusted processes, can ransomware be generically detected?  ( 26 min )
    Monitoring Process Creation via the Kernel (Part II)
    Process monitoring via the KAuth Subsystem (and some limitations)  ( 5 min )
    Two Bugs, One Func(), part three
    Analyzing code within the macOS kernel audit subsystem uncovered an exploitable heap overflow.  ( 5 min )
    Click File, App Opens
    The 'Mac File Opener' adware is fairly normal, except for it how it persists via registered document handlers  ( 9 min )
    WTF is Mughthesec!? poking on a piece of undetected adware
    Some undetected adware named "Mughthesec" is infecting Macs...let's check it out!  ( 5 min )
    Block Blocking Login Items
    Apple recently updated the way login items are stored by the OS. In this post, we'll illustrate how to parse the (new) login item files to detect persistence
    All Your Docs Are Belong To Us
    Here, we reverse, then 'extend' a popular macOS anti-virus engine. With the creation of a new anti-virus signature, classified documents will be automatically detected!  ( 14 min )
    Happy Birthday to Objective-See
    Today is our 2nd birthday! Let's look at our past, present, and future.  ( 2 min )
    From Italy With Love?
    Reverse-engineering a 'Russian' implant reveals HackingTeam's code!?  ( 9 min )
    OSX/Proton.B; a brief analysis, 6 miles up
    Analysis of OSX/Proton.B reveals some interesting tricks plus a command file that can be decrypted to reveal the malware's capabilities  ( 10 min )
    High Sierra's 'Secure Kernel Extension Loading' is Broken
    A new 'security' feature in macOS 10.13, is trivial to bypass.  ( 5 min )
    Analyzing CrossRAT
    The EFF/Lookout discovered a cross-platform implant, named CrossRat with ties to nationstate operators. Here, we tear it apart; analyzing its persistence mechanisms, features, and network communications.  ( 13 min )
    [0day] Bypassing SIP via Sandboxing
    In this guest blog post @CodeColorist writes about a neat macOS vulnerability. Ironically, by abusing security mechanisms such as sandboxing, macOS can be coerced to load an untrusted library, into a SIP-entitled process!
    Pass the AppleJeus
    A new macOS backdoor written by the infamous Lazarus APT group needs analyzing. Here, we examine it's infection vector, method of persistence, capabilities, and more!  ( 10 min )
    Why _blank_ Gets You Root
    Yet another a massive security flaw affects the latest version of macOS (High Sierra), allowing anybody to log into the root account with a blank, or password, of their choosing!  ( 7 min )
    A Surreptitious Cryptocurrency Miner in the Mac App Store?
    Turns out the innocuously named "Calendar 2" app, found on the official Mac App Store, was surreptitiously turning Mac into cryptocurrency miners!  ( 4 min )
    Weaponizing a Lazarus Group Implant
    The Lazarus group's latest implant/loader supports in-memory loading of 2nd-stage payloads. In this post we describe exactly how to repurposing this 1st-stage loader to execute *our* custom 'fileless' payloads!  ( 14 min )
    "Objective by the Sea" v2.0
    After the success of #OBTS v1.0, we decided to go international and plan #OBTS v2.0 in Europe! In this blog post, we re-live the highlights (from Monaco!) of "Objective by the Sea" v2.0.  ( 3 min )
    Mac Malware of 2016
    Let's analyse the malware that appeared in 2016, discussing the infection vector, persistence mechanism, feature, and disinfection for each.  ( 12 min )
    [0day] Synthetic Reality
    If you can programmatically generate synthetic mouse clicks, you can break macOS! Approving kernel extensions, dismissing privacy alerts, and much more more...  ( 8 min )
    Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
    In Objective-See's first guest blog post, Amit Serper presents his detailed analysis of OSX/Pirrit  ( 10 min )
    An Unpatched Kernel Bug
    On my flight to ShmooCon, I managed to panic my fully-patched MacBook. Here we analyze the kernel panic report, finding that Apple's AMDRadeonX4150 kext is responsible for the crash.  ( 7 min )
    From the Top to the Bottom; Tracking down CVE-2017-7149
    High Sierra suffered from a nasty bug (CVE-2017-7149) that afforded local attackers access to the contents of encrypted APFS volumes.  ( 12 min )
    Two Bugs, One Func(), part one
    The macOS kernel had an (intentional?) off-by-one bug that could trigger a kernel panic.  ( 13 min )
    Middle East Cyber-Espionage (part two)
    The APT group WindShift has been targeting Middle Eastern governments with Mac implants. Let's (continue to) analyze their 1st-stage macOS implant: OSX.WindTail!  ( 8 min )
    Two Bugs, One Func(), part two
    Apple's 'fix' for a macOS kernel panic, fixes nothing and worse, introduces a new bug.  ( 13 min )
    Analyzing OSX/CreativeUpdater
    Recently, the popular MacUpdate website was subverted to distribute a new macOS cryptominer; OSX/CreativeUpdater.  ( 5 min )
    Rootpipe Reborn (Part I)
    In part one of a guest blog post, @CodeColorist writes about several neat macOS vulnerabilities.  ( 4 min )
    Writing a File Monitor with Apple's Endpoint Security Framework
    Learn how to leverage Apple's new Endpoint Security Framework to create a comprehensive (user-mode) File Monitor for macOS 10.15!  ( 10 min )
    Tearing Apart the Undetected (OSX)Coldroot RAT
    I uncovered a new cross-platform backdoor that provides remote attackers persistent access to infected systems  ( 12 min )
    Burned by Fire(fox) (Part II)
    Recently, an attacker targeted (Mac) users via a Firefox 0day. In this second post, we fully reverse OSX.NetWire.A, revealing (for the first time!), its inner workings and complex capabilities.  ( 12 min )
    OSX.Dummy
    A new Mac malware targets the cryptocurrency community. In this post, we dive into the malware and illustrate how Objective-See's tools can generically thwart this new threat at every step of the way.
    Breaking macOS Mojave (Beta)
    In macOS Mojave apps, to have to obtain user permission before using the Mac camera & microphone. We'll illustrate how this is trivial to bypass (at least in the current beta).  ( 4 min )
    Remote Mac Exploitation Via Custom URL Schemes
    The WINDSHIFT APT group is successfully infecting Macs with a novel infection mechanism. By abusing custom URL scheme handlers and minimal user interaction, Macs can be remotely compromised!  ( 8 min )
    Middle East Cyber-Espionage
    The APT group WindShift has been targeting Middle Eastern governments with Mac implants. Let's analyze their 1st-stage macOS implant: OSX.WindTail!  ( 7 min )
    Rootpipe Reborn (Part II)
    @CodeColorist continues writing about bugs, such as CVE-2019-8521 and CVE-2019-8565 that provide a mechanism to elevate privileges to root on macOS.  ( 4 min )
    Word to Your Mac
    A malicious Word document targeting macOS users, was recently uncovered. Let's extract the embedded macros, decode an embedded downloader, and retrieve the 2nd-stage payload!  ( 4 min )
    A Remote iOS Bug
    Apple wrote code to appease the Chinese government ...it was buggy. In certain configurations, iOS devices were vulnerable a "emoji-related" flaw that could be triggered remotely!
    Cache Me Outside
    Are full paths and preview thumbnails for files even on encrypted containers and removable usb devices really persistently stored? ...yes :( Apple's 'QuickLook' cache is to blame.  ( 7 min )
    [0day] Mojave's Sandbox is Leaky
    The macOS sandbox is seeks to prevent malicious applications from surreptitiously spy on unsuspecting users. Turns out, it's trivial to sidestep some of these protections, resulting in significant privacy implications!  ( 7 min )
    Escaping the Microsoft Office Sandbox
    Imagine you've gained remote code execution on a Mac via a malicious Word document. Turns out, you're still stuck in a sandbox. However, via a faulty regex, you can escape and persist!  ( 5 min )
    Who Moved My Pixels?!
    In this guest blog post my friend Mikhail Sosonkin reverses Apple's screencapture utility, discusses Mac malware that captures desktop images, and suggests methods for screen-capture detection!  ( 11 min )
    Mac Adware, à la Python
    Let's tear apart a persistent piece of adware, decompiling, decoding, and decompressing it's code to uncover its methods and capabilities.  ( 8 min )
    Mass Surveillance, is an (un)Complicated Business
    A massively popular iOS application turns out to be a government spy tool! Here, we analyze the app; decrypting its binary and studying its network traffic.  ( 12 min )
    When Disappearing Messages Don't Disappear
    Did you know on macOS, notifications are stored in a unencrypted database? Which means that even 'disappearing' messages from apps such as Signal - may not really disappear. Yikes!  ( 4 min )
    Death by vmmap
    A core Mojave utility is rather disastrously broken - causing a full-system lockup. Let's find out why!  ( 6 min )
    [0day] Abusing XLM Macros in SYLK Files
    A 0day logic flaw in Microsoft Excel leads to 'remote' code execution on macOS, via malicious macros.  ( 6 min )
    Burned by Fire(fox) (Part III)
    Recently, an attacker targeted (Mac) users via a Firefox 0day. In this third post, we analyze a second backdoor used in the attack, detailing its persistence, capabilities, and ultimate identify it a new variant of the cross-platform Mokes malware!  ( 6 min )
    Burned by Fire(fox) (Part I)
    Recently, an attacker targeted (Mac) users via a Firefox 0day. In this first post, we triage and identify the malware (OSX.NetWire.A) utilized in this attack, identifying its methods of persistence, and more!  ( 6 min )
    Lazarus Group Goes 'Fileless'
    The rather infamous APT group, "Lazarus", continues to evolve their macOS capabilities. Today, we tear apart their latest 1st-stage implant that supports remote download & in-memory execution of secondary payloads!  ( 8 min )
    Getting Root with Benign AppStore Apps
    In this guest blog post, "Objective by the Sea" speaker, Csaba Fitzl writes about an interesting way to get root via Apps from the official Mac App Store!  ( 17 min )
    The Dacls RAT ...now on macOS!
    A sophisticated Lazarus Group implant has arrived on macOS. In this post, we deconstruct the Mac variant of a OSX.Dacls, detailing its install logic, persistence, and capabilities.  ( 11 min )
    The 'S' in Zoom, Stands for Security
    Today we uncover two (local) security flaws in Zoom's latest macOS client. First, a privilege escalation vulnerability, and second, a method to surreptitiously access a user's webcam and microphone (via Zoom).  ( 12 min )
    Sniffing Authentication References on macOS
    CVE-2017-7170 was a local priv-esc vulnerability that affected OSX/macOS for over a decade! Here (for the first time!), we dive into the technical details of finding the bug, the core flaw, and exploitation.  ( 10 min )
  • Open

    CI/CD pipeline abuse: the problem no one is watching
    How we built an open-source, drop-in CI template that uses signal extraction and LLM reasoning to catch CI/CD abuse in GitHub Actions, GitLab CI, and Azure DevOps pipelines.  ( 25 min )

  • Open

    Windows 11 point-in-time restore: configuration, limitations, and requirements
    Windows 11 is getting a new recovery feature called point-in-time restore, currently available as a preview in the Canary Insider channel (build 29576). It lets you roll back an entire PC—including the operating system, apps, settings, and local files—to a snapshot taken within the last 72 hours. Unlike the older System Restore feature, point-in-time restore captures the full system state on a schedule and is designed to be managed remotely in the future. This article covers how it works, how to configure it, and where its current limitations lie. Source
    Uninstall Copilot from Windows 11 with RemoveMicrosoftCopilotApp Group Policy, PowerShell or Intune
    Microsoft released a new policy in April 2026 that lets you remove the Microsoft Copilot consumer app from managed Windows 11 devices using Group Policy or Microsoft Intune. The policy is called RemoveMicrosoftCopilotApp and is part of the April 2026 Windows security update. Alternatively, you can uninstall Copilot with PowerShell or Intune. Source
  • Open

    Securing GitHub: Wiz Research uncovers Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854)
    Details on CVE-2026-3854: A critical flaw in GitHub’s internal git infrastructure enabling RCE on GitHub.com and GitHub Enterprise Server.  ( 63 min )
  • Open

    PortSwigger recognized at the Northern Tech Awards 2026.
    We’re proud to announce that PortSwigger recently won the Overall Judges’ Award at the Northern Tech Awards 2026. The Northern Tech Awards are run by GP Bullhound, the tech advisory and investment fir  ( 4 min )

  • Open

    Why Mac security updates take too long and how to fix it
    Mac security updates lag due to legacy workflows. DDM enables faster patching, reducing vulnerability windows and manual effort for IT teams.  ( 7 min )
  • Open

    Windows 11 update control: Skip, pause, and restart without forced installs
    Microsoft is rolling out several long-requested changes to the Windows Update experience in Windows 11. You can now skip updates during initial device setup, pause them for up to 35 days with no limit on how many times you extend the pause, and restart or shut down your PC without being forced to install a pending update. Driver, .NET (Microsoft's application runtime framework), and firmware updates will be bundled into a single monthly restart cycle. These changes are currently rolling out to Windows Insiders in the Dev and Experimental channels. Source
  • Open

    NIST NVD Update: What it Means For Vulnerability Management
    The shift from static CVE scoring to risk-based prioritization signals a new era for Vulnerability Managers  ( 52 min )
  • Open

    MacOS malware persistence 11: osascript LOLBin. Simple C example
    ﷽  ( 4 min )

  • Open

    Monitoring Claude Code/Cowork at scale with OTel in Elastic
    How Elastic's InfoSec team built a monitoring pipeline for Claude Code and Claude Cowork using their native OTel export capabilities and Elastic's OTel ingestion infrastructure.  ( 22 min )

  • Open

    Microsoft LiteBox: a library OS for secure sandboxing and running Linux apps on Windows
    Microsoft has released LiteBox, an open-source Library Operating System (Library OS) designed to strengthen security through application sandboxing. LiteBox minimizes the attack surface by restricting application access to system resources. While the core relies on Rust, the project includes specific low-level components written in C and Assembly. Additionally, LiteBox enables running Linux applications on Windows. Source

  • Open

    fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
    A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.  ( 45 min )
  • Open

    fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
    A previously unknown 2005 cyber sabotage framework patches high-precision calculation software in memory to silently corrupt results.  ( 45 min )
  • Open

    Anthropic’s PR nightmare, Matthew Berman’s outburst, and AI usage explosion
    Anthropic has spent the last year turning Claude into the darling of power coders just as AI usage has exploded across companies, workflows, and entire industries, pushing demand for agentic coding tools to unprecedented levels. In this environment of runaway adoption, a brutal miscalculation on compute and capacity is now blowing Anthropic’s strategy up in public. In a rare, sharply critical video, AI YouTuber Matthew Berman explains how opaque quotas, shifting policies, and confusing restrictions are undermining Anthropic’s once brilliant flywheel and handing OpenAI an effortless PR win. In this post, I summarize his critique, explain why I stopped trusting Anthropic for professional work a while back, and outline why building provider-agnostic agents is the only sane strategy in this unstable industry. Source
  • Open

    20 years of Jamf Training: Empowering IT professionals to succeed with Apple
    Jamf Training marks 20 years of empowering IT professionals with hands-on learning, certifications, and evolving pathways to manage and secure Apple.  ( 12 min )
  • Open

    Goodbye Secure Pool, Hello KDP Pool
    Kernel Data Protection (KDP) is a Windows 11 VBS feature that allows drivers to protect their data from being modified by other kernel drivers or malware that achieved kernel write access. It actually contains two separate features: static and dynamic KDP. Static KDP, that allows drivers to enforce read-only protection on a data section be […]  ( 13 min )
  • Open

    Intelligence Insights: April 2026
    Poisoned packages and pipeline perils in this month's edition of Intelligence Insights.  ( 29 min )
  • Open

    MSSQLHound Now Available in Go
    TL;DR: Javier Azofra and I vibe-ported MSSQLHound to Go to drastically improve run duration, enable cross-platform execution, support SOCKS proxying for stealth and NT hashes/Kerberos tickets for authentication, enhance logging, detect the latest encryption and extended protection for authentication (EPA) settings, and enable pathfinding in BloodHound. MSSQLHound adds 7 new nodes and 37 new MSSQL […] The post MSSQLHound Now Available in Go appeared first on SpecterOps.  ( 11 min )
  • Open

    CVE-2026-33824: Remote Code Execution in Windows IKEv2
    In this excerpt of a TrendAI Research Services vulnerability report, Richard Chen and Lucas Miller of the TrendAI Research team detail a recently patched double free vulnerability in the Windows Internet Key Exchange (IKE) service. This bug was originally discovered by WARP & MORSE team at Microsoft. Successful exploitation could result in a crash of the IKEEXT service, or potentially arbitrary code execution. The following is a portion of their write-up covering CVE-2026-33824, with a few minimal modifications. A double free vulnerability has been reported in the Windows Internet Key Exchange (IKEv2) service. The vulnerability is due to an error when processing fragments. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted packets to the target server. …
  • Open

    Otto Support – An MCP, Agentic-AI Security Challenge
    Bishop Fox built a vulnerable MCP-based customer support tool and turned it into a security challenge. Explore how AI agents interact with tools, escalate privileges, and expose sensitive data. If you work with AI systems, this CTF shows exactly how these architectures fail in the real world.  ( 10 min )
  • Open

    Trailmark turns code into graphs
    We’re open-sourcing Trailmark, a library that parses source code into a queryable call graph of functions, classes, call relationships, and semantic metadata, then exposes that graph through a Python API that Claude skills can call directly. Install it now: uv pip install trailmark “Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.” John Lambert’s widely cited observation about network security applies just as well to AI-assisted software analysis. When Claude reasons about a codebase, it reasons about lists: findings from static analyzers, surviving mutants from mutation testing, and line-by-line coverage reports. But the question that actually matters is a graph question: can untrusted input reach this code, and what breaks if it’s wrong? We bui…  ( 7 min )
  • Open

    MacOS malware persistence 10: caffeinate LOLBin. Simple C example
    ﷽  ( 3 min )

  • Open

    LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
    Marc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.  ( 24 min )
  • Open

    LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
    Marc Rogers and Silas Cutler expose how cheap smart home devices conceal a shadow supply chain of shell companies, firmware flaws, and foreign data routing.  ( 24 min )
  • Open

    Microsoft Sentinel Logstash output plugin: DCR-based log ingestion
    Microsoft has released a new version of the Logstash output plugin for Microsoft Sentinel in public preview. The plugin replaces the older authentication method—a shared workspace key—with Microsoft Entra ID app-based authentication and routes data through Azure Monitor's Data Collection Rules. This article explains how the plugin works, what you need to set it up, and its current limitations. Source
    Exchange 2016/2019 ESU Period 2: paid security updates until October 2026
    Microsoft announced on April 15, 2026, a second paid security update period—called "Period 2"—for Exchange Server 2016 and 2019. This extends coverage from May through October 2026 for organizations unable to complete their migration to Exchange Server Subscription Edition (SE). The program covers only security-related patches and requires a separate purchase via a Microsoft Enterprise Agreement. This article explains what the program includes, who qualifies, and the practical limitations. Source
  • Open

    SpecterOps Selected for OpenAI’s Trusted Access for Cyber Program
    SpecterOps has been named to OpenAI's inaugural Trusted Access for Cyber (TAC) cohort (alongside Nvidia, CrowdStrike, JPMorgan Chase, and Bank of America and others) giving verified defenders governed access to advanced AI models for legitimate security use cases.  The post SpecterOps Selected for OpenAI’s Trusted Access for Cyber Program appeared first on SpecterOps.  ( 11 min )
  • Open

    Balancing safety and learning: managing risky content in K-12
    Discover how granular, device-level content filtering gives K-12 IT teams the precision to protect students everywhere without blocking the tools teachers depend on.  ( 7 min )
  • Open

    Understanding the CVE Ecosystem and NIST’s Changing Role
    NIST just announced it's prioritizing CVE enrichment for government systems and deprioritizing everything else. For security teams that rely on NVD data, the gap is real. Here's what changed, why it's been coming for years, and what your team should do to stay ahead of the risk.  ( 13 min )
  • Open

    Wiz at Google Next: Machine-Speed Defense for Any Cloud, Any Platform, Any AI
    Announcing new capabilities at Google Cloud Next that extend and deepen Wiz AI-APP coverage: From the first line of AI-generated code, across AI and agent studios, to the edge of the cloud  ( 60 min )
  • Open

    Some unintelligent fun with ms-notepad protocol
    In my previous post I have provided a list of ‘new’ protocols I noticed in the latest Windows 11 build. One that immediately caught my attention was “ms-notepad://”. You can use it to launch Notepad via “ms-notepad://” links and it … Continue reading →  ( 2 min )

  • Open

    New Windows RDP phishing warning: Caution: Unknown remote connection
    The April 2026 Patch Tuesday updates add anti-phishing protection to the Windows Remote Desktop client (mstsc.exe). The change — assigned CVE-2026-26151 — means that opening an .rdp file now triggers a security dialog that lists all requested resource-sharing settings, each disabled by default. Files without a verifiable publisher show a red "Caution: Unknown remote connection" banner. The update affects Windows 10 and Windows 11 versions 23H2 and later. Source
    Remove Copilot and bloatware from Windows 11 with Rufus 4.14
    Rufus is a free, open-source tool that creates bootable USB drives for installing Windows. Version 4.14 Beta, released on April 21, 2026, adds a new option to disable or remove preinstalled Microsoft apps such as Copilot, Teams, and Outlook during a fresh Windows installation. It also introduces a fully silent, unattended installation mode and an option to deploy a Secure Boot policy file at install time. This article explains what these new features do, how to use them, and where to be careful. Source
  • Open

    500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the Noise
    When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint detection and response platforms, vulnerability scanners, cloud security posture tools, container image scanners. A large organization can easily accumulate hundreds of thousands of individual findings. The standard response is to sort by CVSS score, filter for criticals, and […] The post 500,000 Vulnerabilities, 14 That Matter: How Exploit Chain Analysis Cuts Through the Noise appeared first on Praetorian.  ( 18 min )
  • Open

    The Vercel Breach Explains Why Identity Attack Path Management Can’t Wait
    Every AI tool connected to a corporate identity system is a non-human identity with delegated rights. The Vercel breach shows exactly what happens when no one maps where those rights lead. The post The Vercel Breach Explains Why Identity Attack Path Management Can’t Wait appeared first on SpecterOps.  ( 14 min )
  • Open

    AI can help in DFIR, but it cannot replace investigator judgement
    TL;DR  Introduction   In my previous blog post, I wrote about finding your path into DFIR; how to get started, where to focus your time, and why curiosity and good fundamentals matter more than just chasing every certification.  That is still true, but once you have been in the field for a while, you start to realise that getting into DFIR is only […] The post AI can help in DFIR, but it cannot replace investigator judgement appeared first on Pen Test Partners.  ( 10 min )
  • Open

    Closing the Security Gap in the Age of Agentic Coding
    AI agents are writing more and more code. Ensure it's secure. Learn how Wiz Code plugins and the Green Agent bring machine-speed remediation to your AI-IDE.  ( 56 min )
    Mapping Your API Ecosystem: Wiz Expands API Discovery with Apigee
    See your full Apigee architecture on the Wiz Security Graph, from API gateways and environments to every endpoint and its authorization scheme.  ( 53 min )
  • Open

    The Cost of Understanding: LLM-Driven Reverse Engineering vs Iterative LLM Obfuscation
    Elastic Security Labs explores the ongoing arms race between LLM-driven reverse engineering and obfuscation.  ( 67 min )

  • Open

    What are RDP plugins? Build your own dynamic virtual channel (DVC) plugin using Microsoft’s new sample repo
    Remote Desktop Protocol (RDP) has supported extensibility through virtual channels for decades, but the modern approach—dynamic virtual channels (DVCs)—is what you need today, especially in cloud environments like Azure Virtual Desktop and Windows 365. This article explains what DVCs are, how they differ from the older static model, how a plugin is structured and registered, and how to get started with Microsoft's newly released sample repository. Source
  • Open

    Three lessons from DarkSword: inside a government-grade iPhone exploit kit
    Jamf Threat Labs analyzes leaked source code of a Safari exploitation kit (DarkSword) and the impact of this disclosure on the mobile ecosystem.  ( 12 min )
  • Open

    Context.ai OAuth Token Compromise
    Compromised Context.ai OAuth tokens enabled attackers to perform a supply chain attack via trusted SaaS integrations. Learn how to assess the risk in your environment and how to prevent the next attack.  ( 55 min )
    Wiz and Databricks: Adding Databricks to the Wiz Security Graph
    Extending Wiz Visibility with the Databricks Data & AI Platform  ( 54 min )
    From Code to Pipeline: Wiz Code Now Secures Your Build Environment
    Threat actors have moved upstream, and while security teams have focused on the code developers write, the systems that build and deliver that code have remained a blind spot.  ( 58 min )
  • Open

    Some notes on the security properties of the pipe_buffer kernel object
    Many exploits of Linux kernel vulnerabilities use the pipe_buffer kernel object to build strong exploit primitives. When I was experimenting with my personal project kernel-hack-drill, I discovered some interesting properties of pipe_buffer, which may not be described in public articles (at least, I didn't find them). That's why I decided to write this short post and share my thoughts.

  • Open

    CFITSIO Fuzzing: Memory Corruptions and a Codex-Assisted Pipeline
    Have you ever wondered how those amazing space photos are taken? Are they exclusive to the big telescopes floating in space or can you take one from your backyard? What does it take to extract hydrogen colors out of a seemingly black sky? Those are great questions, but you won’t learn it from here. Instead, I’ll show how I set up and performed fuzzing of the CFITSIO library which is how those space photos are usually processed. I’ll show how the bugs were triaged at scale, and how Codex was used to unblock the fuzzing and to develop the initial security fixes. Note: the work described in this blogpost used the GPT-5-Codex, which was the latest model I had access to at the time. FITS Format The Flexible Image Transport System (FITS) is a data standard created in the late 1970s by NASA, E…  ( 8 min )
  • Open

    Update: cut-bytes.py Version 0.0.18
    This is a fix for escape sequences that trigger warnings in the latest Python versions. cut-bytes_V0_0_18.zip (http)MD5: C5FE455A5371C6675EDF16200D7C5657SHA256: A4F2A2CFE3614F32F9127F1BAA898260B7C3DF6DEA9544513A375519DE7A5595  ( 11 min )

  • Open

    Azure Migrate: auto-discover SMB and NFS file shares
    Azure Migrate, Microsoft's cloud migration hub, gained a new capability in April 2026: automated, agentless discovery and assessment of SMB and NFS file shares hosted on Windows and Linux servers. The feature extends Azure Migrate's existing workload coverage — which already included servers, databases, and web apps — to file shares. It recommends which of Microsoft's two Azure Files storage tiers is appropriate for each share and estimates monthly costs. Previously, file share migration planning relied on manual scripts or spreadsheets. This article explains how the feature works, what you need to use it, and where its limitations lie. Source
  • Open

    A few more protocol handlers :), Part 2
    In 2018 I published this post. In 2022 I published this post and this post. @Radkeyboard7984 and I continue chatting about the new Windows 11 protocols and I just did a quick comparison between the protocols I posted before, and … Continue reading →  ( 2 min )

  • Open

    Breaking Opus 4.7 with ChatGPT (Hacking Claude's Memory)
    In this post, we explore how ChatGPT generated an adversarial image that hijacked my Claude Opus 4.7 to invoke the memory tool and persist false memories for future chats. This matters because Opus 4.6+ is genuinely a lot harder to attack than previous models, but it still fell for a ChatGPT generated image. A trick that works well with reasoning models is to challenge them with puzzles. Indirect Prompt Injection and Alignment Progress Claude Opus 4.6+ is more resilient against basic attacks, and reasons before taking actions. This means that most of the well-known, basic adversarial examples and attacks typically do not work.  ( 5 min )
  • Open

    Walking Through an Attack Path with ForceHound
    In Part 2 of the series, Weylon covers how to use ForceHound to visualize Salesforce attack paths in BloodHound CE, identify transitive privilege escalation, and legacy Connected App exposures. The post Walking Through an Attack Path with ForceHound appeared first on NetSPI.  ( 13 min )
    Auditing Salesforce Permission Hierarchies with ForceHound
    Discover how ForceHound automates the collection of profiles, permission sets, and connected apps to reveal the true trust boundaries of your Salesforce organization. The post Auditing Salesforce Permission Hierarchies with ForceHound  appeared first on NetSPI.  ( 18 min )
  • Open

    IaC Inventory: A Unified View Across Code, Deployments, and Cloud
    As AI applications introduce a new class of infrastructure resources, visibility into what your IaC creates, where it runs, and whether it has drifted has never been more critical.  ( 56 min )
  • Open

    We beat Google’s zero-knowledge proof of quantum cryptanalysis
    Two weeks ago, Google’s Quantum AI group published a zero-knowledge proof of a quantum circuit so optimized, they concluded that first-generation quantum computers will break elliptic curve cryptography keys in as little as 9 minutes. Today, Trail of Bits is publishing our own zero-knowledge proof that significantly improves Google’s on all metrics. Our result is not due to some quantum breakthrough, but rather the exploitation of multiple subtle memory safety and logic vulnerabilities in Google’s Rust prover code. Google has patched their proof, and their scientific claims are unaffected, but this story reflects the unique attack surface that systems introduce when they use zero-knowledge proofs. Google’s proof uses a zero-knowledge virtual machine (zkVM) to calculate the cost of a quantu…  ( 14 min )

  • Open

    WerReportCreate API
    The API I want to talk about today is called WerReportCreate. It takes a few arguments, but the most interesting is the first one, which is the Event Name. Looking at Windows OS binaries, we can see this API being … Continue reading →  ( 2 min )
  • Open

    Into The Rainbow: Google’s NTLMv1 Rainbow Tables Explained in a Bit Too Much Detail
    TL;DR: Google published a blog post with accompanying rainbow tables targeting the Data Encryption Standard (DES) key space. The tables enable recovery of the NT hash used to generate the ciphertexts in NTLMv1 responses. We’ll dive into the tables, the recovery process, and ideally demystify any lingering questions. Acknowledgements There are many previous works on […] The post Into The Rainbow: Google’s NTLMv1 Rainbow Tables Explained in a Bit Too Much Detail appeared first on SpecterOps.  ( 15 min )
  • Open

    Introducing Bring Your Own Key (BYOK) for enhanced cloud security
    Jamf's new Bring Your Own Key (BYOK) feature gives organizations in regulated industries complete control over their encryption keys to protect sensitive data across Jamf Pro and cloud-hosted services.  ( 6 min )
  • Open

    New in Microsoft Fabric and OneLake: Database Hub and Fabric IQ
    At FabCon and SQLCon 2026 in Atlanta, Microsoft announced additions to Microsoft Fabric, its integrated data and analytics platform. The highlights include the Database Hub—a unified management console for major Microsoft database services—Fabric IQ, a new semantic layer that gives AI tools a structured understanding of business data, and a series of updates to OneLake, the shared data storage layer that underpins Fabric. This article provides simple introductions to OneLake, Fabric, Database Hub, and Fabric IQ, and outlines other new features announced in Atlanta. Source
  • Open

    Introducing the official Burp Ambassador Program
    Why we’re launching the program What it means to be a Burp Ambassador What we’re aiming for Our Burp Ambassadors Alan Levy Corey Ball Federico Dotta Rana Khalil Tib3rius Looking ahead Get Involved - B  ( 4 min )
  • Open

    Taking Maestro in Stride: AI Threat Modeling Frameworks
    AI agents don’t fit traditional threat models. They act like users, services, and data pipelines at once. Learn why STRIDE alone falls short, how MAESTRO fills the gaps, and why modern AI systems must be treated as insider threats.  ( 14 min )
    Taking Maestro in Stride
    AI agents don’t fit traditional threat models. They act like users, services, and data pipelines at once. Learn why STRIDE alone falls short, how MAESTRO fills the gaps, and why modern AI systems must be treated as insider threats.  ( 14 min )
  • Open

    Securing AI Applications From Inception to Deployment
    Extending the Wiz AI APP into the code layer to detect AI-specific risks at inception, validate exploitability at runtime, and orchestrate remediation with agents that understand your codebase  ( 55 min )

  • Open

    Shadow Admins in Active Directory: Hidden Privilege Paths Attackers Exploit
    What Are Shadow Admins in AD? A common problem we encounter within many customer AD environments are accounts that, at first glance, may appear innocuous, but that actually have hidden administrative privileges equivalent to those of a domain administrator account. We call these accounts shadow admins. They represent one of the most persistent shadow admin […] The post Shadow Admins in Active Directory: Hidden Privilege Paths Attackers Exploit appeared first on Praetorian.  ( 14 min )
  • Open

    What’s New in the BloodHound Query Library: BYOL, OpenGraph, Multi-Server, and More
    BloodHound Query Library - queries.bloodhound.io - update details: import custom query sources & shipping with three OpenGraph extension sources (Jamf, GitHub, Okta), multi-server support, new queries including mappings to PurpleKnight, upcoming deprecation of system_tags conditions, built-in Cypher cheat sheet, and more. The post What’s New in the BloodHound Query Library: BYOL, OpenGraph, Multi-Server, and More appeared first on SpecterOps.  ( 12 min )
  • Open

    Microsoft 365 Copilot security: Purview DLP, oversharing controls, and dashboard analytics
    Microsoft released new security and governance controls for Microsoft 365 Copilot, introducing Data Loss Prevention (DLP) policies that inspect prompts before Copilot processes them, protecting web searches from leaking sensitive data, and enabling bulk remediation of overshared SharePoint files. The Copilot Dashboard gained expanded access, user satisfaction tracking, and CSV export. This article explains what each feature does technically, how to configure the relevant policies, and where the current limitations are. Source
  • Open

    Identity, browsers, and node.js: Everything you missed in the Threat Detection Report miniseries
    Get cliff notes from our three-part deep dive into the 2026 Threat Detection Report and watch every episode, on demand now.  ( 28 min )
  • Open

    How to Harden GitHub Actions: An Updated Guide
    Build resilient GitHub Actions workflows with lessons from recent attacks like TeamPCP and Axios.  ( 69 min )

  • Open

    Dedicated Internet Gateway: Safely and securely route network traffic
    Introducing Dedicated Internet Gateway, a better way to route traffic. Available with Jamf for Mac and Jamf for Mobile.  ( 5 min )
    Automation that saves IT time: what small teams should prioritize
    Automation helps small IT teams reduce manual work, improve consistency, strengthen security and support growing Apple fleets without adding headcount.  ( 9 min )
    Platform Authentication Across Jamf: A Year of Progress
    When we introduced blueprints to Jamf Pro and Jamf School, we introduced more than a feature. It's Jamf's approach to delivering declarative device management (DDM) capabilities — and how we'll continue to ship new ones as Apple's framework evolves.  ( 11 min )
    Maximizing employee productivity on Apple devices
    It's possible to improve employee experience and productivity without compromising control. Learn how to reduce downtime, empower users and keep devices secure and compliant.  ( 9 min )
  • Open

    The April 2026 Security Update Review
    It’s time once again for Patch Tuesday, and this one is huge. We’ve also got multiple exploits in the wild, which adds another layer of urgency to this month’s release. Take a break from your regularly scheduled activities, and let’s take a look at the latest security patches from Adobe and Microsoft. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for April 2026 For April, Adobe released 12 bulletins addressing 61 unique CVEs in Adobe Acrobat Reader, InDesign, InCopy, FrameMaker, Connect, ColdFusion, Bridge, Photoshop, Illustrator, Experience Manager Screens, and the Adobe DNG SDK. Three of the Cold Fusion bugs came through the TrendAI ZDI program. For this month, I’m introducing an Adobe table as well. I’d love to get your …
  • Open

    Securing the AI Edge: Wiz and Cloudflare Integrate for End-to-End AI Protection
    Gain a unified view of AI application endpoints and DNS exposure across your environment, including which are protected by Cloudflare and which need to be secured  ( 54 min )
    Introducing Shadow Data Detection: Reduce Cost and Risk Across Your Cloud
    Identify stale, duplicated, and inefficient data — and take action to shrink both your storage spend and exposure surface.  ( 53 min )
    Primer on GitHub Actions Security - Threat Model, Attacks and Defenses (Part 1/2)
    Understanding and defending your GitHub Actions - from threat model to security controls.  ( 61 min )
  • Open

    Anthropic’s Claude Mythos Preview: The AI Cybersecurity Inflection Point
    AI just crossed a threshold. Anthropic’s Claude Mythos can discover and chain vulnerabilities at scale—faster than teams can remediate. What does this mean for your security program, your providers, and your ability to keep up before attackers do?  ( 10 min )
  • Open

    New: Use response actions to update Zscaler policies and block threats
    A new integration gives teams an easy way to update Zscaler Internet Access (ZIA) network policies using Red Canary response actions.  ( 27 min )
  • Open

    Microsoft Entra SCIM 2.0: Now with bidirectional provisioning
    Microsoft introduced new SCIM 2.0 APIs for Microsoft Entra. The APIs now support bidirectional provisioning, which allows external identity systems to provision users and groups directly into Entra. SCIM (System for Cross-domain Identity Management) is an open internet standard that defines a common HTTP-based protocol for managing user accounts across different systems. Previously, Entra could only push user data to other applications via SCIM. Now, it also accepts incoming SCIM requests. The APIs follow a consumption-based pricing model, require an Azure subscription, and are generally available in the Microsoft public cloud. Source
  • Open

    Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT
    Elastic Security Labs uncovers a novel social engineering campaign that abuses the popular note-taking application, Obsidian's legitimate community plugin ecosystem. The campaign, which we track as REF6598, targets individuals in the financial and cryptocurrency sectors through elaborate social engineering on LinkedIn and Telegram.  ( 43 min )

  • Open

    BloodHound 9.0 — Product Updates
    Two weeks ago, we announced the new BloodHound Enterprise with OpenGraph extensions to extend attack path management to environments like Okta, GitHub, and Jamf. Along with this announcement, I’m pleased to share the release of BloodHound 9.0.  Attack paths move through SaaS apps, cloud platforms, endpoints, and identity providers; wherever relationships create opportunity. Attackers have […] The post BloodHound 9.0 — Product Updates appeared first on SpecterOps.  ( 12 min )
  • Open

    MacBook Neo and Apple Business: expanding the entry point for Mac in the enterprise
    MacBook Neo lowers the cost barrier to Mac adoption, creating a clear path from first device to enterprise scale. Learn how to start your Mac deployment with Apple tools and discover how to grow with Jamf.  ( 9 min )
  • Open

    Entra ID Conditional Access Optimization Agent: AI-driven policy gap detection
    Microsoft's Conditional Access Optimization Agent uses AI to continuously scan your Microsoft Entra ID environment for policy gaps and recommend remediations. It requires a Microsoft Entra ID P1 license and a Microsoft Security Copilot subscription. Several new features are in public preview, including context-aware recommendations, deep gap analysis across all policies, and phased policy rollouts. This article explains what Conditional Access policies are, how the agent works, what you need to run it, and where its limitations lie. Source

  • Open

    Mobile malware development trick 3. CPU info logger: anti-VM and anti-sandbox. Simple Android (Kotlin) example.
    ﷽  ( 7 min )

  • Open

    BloodHound Has Changed. Your Course Probably Hasn’t.
    BloodHound has moved fast and not all courses have kept up. If you create or maintain a course or training that includes BloodHound, now is a good time to review your materials. BloodHound Community Edition (BHCE) has continued to evolve rapidly, with v8.9 releasing just last week. There have been many updates that apply to […] The post BloodHound Has Changed. Your Course Probably Hasn’t. appeared first on SpecterOps.  ( 12 min )

  • Open

    Bypassing LLM Supervisor Agents Through Indirect Prompt Injection
    Indirect prompt injection lets attackers bypass LLM supervisor agents by hiding malicious instructions in profile fields and contextual data. Learn how this attack works and how to defend against it. The post Bypassing LLM Supervisor Agents Through Indirect Prompt Injection appeared first on Praetorian.  ( 16 min )
  • Open

    Ghostwriter v6.3.0 and CLI v1.0.0: New Activity Logging, Faster Installs, and Better Writing QA
    TL;DR: Ghostwriter v6.3.0 makes day-to-day operations faster and more integrated, with a redesigned activity log that ties actions directly to evidence and terminal recordings, dramatically faster installs via published container images, and built-in writing QA through passive voice detection. Alongside it, Ghostwriter CLI v1.0.0 standardizes deployment and configuration workflows. Together, these changes reduce operational friction […] The post Ghostwriter v6.3.0 and CLI v1.0.0: New Activity Logging, Faster Installs, and Better Writing QA appeared first on SpecterOps.  ( 16 min )
    Janus: Listen to Your Logs
    TLDR: Operators are telling you what to build. Janus listens. Every failed command, retry, and workaround during an engagement is useful data but it usually gets deleted and forgotten. Janus surfaces that data instead, showing your team where your tooling breaks, where operators lose time, and what you could automate next. To jump right in, […] The post Janus: Listen to Your Logs appeared first on SpecterOps.  ( 16 min )
  • Open

    Windows 365 Cloud PC monitoring in Intune: health, performance, and configuration
    Microsoft has released a new unified monitoring and reporting platform for Windows 365 Cloud PCs into public preview in April 2026. It is built into the Microsoft Intune admin center and consolidates health, performance, and configuration data that was previously scattered across multiple locations. This article explains what the platform monitors, how you access it, and where its current limitations lie. Source
  • Open

    Claude Mythos: Preparing for a World Where AI Finds and Exploits Vulnerabilities Faster Than Ever
    Anthropic's new model can autonomously discover zero-days and develop working exploits. While access is currently limited to responsible actors, now is the time to strengthen response playbooks, reduce exposure, and incorporate AI into security programs.  ( 61 min )
  • Open

    Security’s Blind Spot: Physical Keyloggers That Bypass Antivirus Entirely
    Keyloggers: A Persistent Threat Nowadays, virtually all digital services rely on logins and authentication, from email inboxes to help desks. These involve login credentials to prove identity, typically at least a username and a password. Initially, this information is confidential from a potential attacker. While a username can be relatively easy to guess in a … Continue reading Security’s Blind Spot: Physical Keyloggers That Bypass Antivirus Entirely →  ( 16 min )

  • Open

    Inside Cirro: Attack Paths, Cloud Graphs, and Extensible Schemas
    Cloud risk doesn’t live in a single permission, it lives in the relationships between them. Discover how Cirro maps hidden attack paths across Azure identities, resources, and data to reveal what attackers actually see.  ( 11 min )
  • Open

    Mythos, Machine-Speed Exploitation, and the Growing Importance of Identity Attack Paths
    When Anthropic announced Mythos and the associated rollout plan, it sparked an immediate wave of discussion across the cybersecurity community. Overnight, forums from Reddit to X filled with purported insider details, speculation, and concern that next generation models could significantly change cybersecurity for both adversaries and defenders.  For years, security teams have worked with a certain amount of offensive friction in mind. Finding […] The post Mythos, Machine-Speed Exploitation, and the Growing Importance of Identity Attack Paths appeared first on SpecterOps.  ( 15 min )
  • Open

    Windows 365 connector for Power Platform and Logic Apps: automate Cloud PC management
    Microsoft announced the public preview of the Windows 365 connector for Microsoft Power Platform and Azure Logic Apps on April 2, 2026. The connector lets you build automated workflows around Windows 365 Cloud PCs — the cloud-hosted Windows virtual machines that Microsoft manages for individual users. Using prebuilt building blocks called actions and triggers, you can automate tasks such as notifying users when their Cloud PC is ready, bulk-managing provisioning policies, or reacting automatically to administrative events. The connector is currently in public preview and is classified as a premium connector, which has licensing implications described below. Source
  • Open

    Cloud Threats Retrospective 2026: What AI Changed (and What It Didn’t)
    Insights from public incidents, cloud telemetry, and investigations into how cloud risk evolved in 2025  ( 51 min )
    Bringing Security Visibility to Vercel with Wiz
    Giving developers and security teams a shared view of application risk as it evolves.  ( 52 min )
  • Open

    You can pen test OT networks without breaking them
    TL;DR  Introduction   There is a widely held belief that penetration testing Operational Technology networks is impossible. That simply connecting a laptop to a network will take down everything. That running nmap will take down a factory. That the only safe approach is to not test at all.  This belief is wrong. Or rather, it is a massive […] The post You can pen test OT networks without breaking them  appeared first on Pen Test Partners.  ( 11 min )
  • Open

    Master C and C++ with our new Testing Handbook chapter
    We added a new chapter to our Testing Handbook: a comprehensive security checklist for C and C++ code. We’ve identified a broad range of common bug classes, known footguns, and API gotchas across C and C++ codebases and organized them into sections covering Linux, Windows, and seccomp. Whereas other handbook chapters focus on static and dynamic analysis, this chapter offers a strong basis for manual code review. LLM enthusiasts rejoice: we’re also developing a Claude skill based on this new chapter. It will turn the checklist into bug-finding prompts that an LLM can run against a codebase, and it’ll be platform and threat-model aware. Be sure to give it a try when we release it. And after reading the chapter, you can test your C/C++ review skills against two challenges at the end of this p…  ( 4 min )
  • Open

    Elastic on Defence Cyber Marvel 2026: A Technical overview from the Exercise Floor
    An overview of the Elastic Security and AI infrastructure deployed to support the UK Ministry of Defence's flagship cyber exercise, Defence Cyber Marvel 2026.  ( 57 min )

  • Open

    Inside Predator’s kernel engine
    Commercial spyware defeats Apple's pointer authentication and achieves kernel memory access. Jamf Threat Labs investigates.  ( 13 min )
  • Open

    How I Became A Red Hat Certified Architect In 6 Months And Everything I Wish I Knew Beforehand.
    No content preview
  • Open

    Node.js Trust Falls: Dangerous Module Resolution on Windows
    In September of 2024, ZDI received a vulnerability submission from an anonymous researcher affecting npm CLI that revealed a fundamental design issue in Node.js. This blog details how it continues to expose applications to local privilege escalation (LPE) attacks on Windows systems, including the Discord desktop app (CVE-2026-0776 0-Day), which remains unpatched and vulnerable. The issue is straightforward: when Node.js resolves modules, the runtime searches for packages in C:\node_modules as part of its default behavior. Since low-privileged Windows users can create this directory and plant malicious modules there, any Node.js application with missing or optional dependencies becomes vulnerable to privilege escalation. This issue is not new. Concerned discussions about Node.js's module se…
  • Open

    Microsoft Entra March 2026: Passkeys GA, backup preview, and Hybrid Security Fix
    Microsoft's March 2026 Entra update promotes passkey authentication to general availability, introduces a built-in tenant backup feature in public preview, and announces a breaking security change for hybrid environments, taking effect June 1, 2026. Additional changes enforce TLS 1.2 for Entra Connect Health agents and bring several multi-tenant governance capabilities into preview. This article covers changes relevant to administrators managing Microsoft 365 tenants and hybrid Active Directory environments. Source
  • Open

    AI in cybersecurity: The good, the bad, and the FUD
    The 2026 Threat Detection Report surveys the AI landscape for both defenders and adversaries. Here’s how you can stay ahead.  ( 28 min )
  • Open

    Given Enough Agents, All Bugs Become Shallow
    A few months ago I had this realization that agents have become really good at identifying bugs in code, especially security vulnerabilities. They are relentless in analyzing code and you can spin up multiple of them to go through source code quickly. given enough agents, all bugs are shallow — Johann Rehberger (@wunderwuzzi23) February 10, 2026 It is an emerging capability that many security researchers and bug bounty hunters have observed over the last few months.  ( 5 min )

  • Open

    RSA Conference 2026 recap: AI security, enterprise mobile security and the shift to connected security platforms
    RSA Conference 2026 highlighted how AI is reshaping security operations and introducing new risks while Mac and mobile adoption continues to accelerate in the enterprise — reinforcing the need for connected, identity-driven security platforms. Find out more.  ( 9 min )
    Introducing the Jamf 140 Course
    The free, self-paced Jamf 140 Course builds foundational skills to manage, secure and deploy Apple devices in K-12 environments.  ( 6 min )
  • Open

    Rubber Duck in GitHub Copilot CLI: reducing AI hallucinations with a second opinion
    GitHub Copilot CLI—GitHub's AI assistant for the terminal—introduced an experimental feature called Rubber Duck that pairs your primary AI model with an independent reviewer from a completely different AI vendor. The goal is to catch early planning mistakes before they compound into harder-to-fix downstream errors, a known weakness of single-model AI agents. In performance testing on real-world coding problems, combining Claude Sonnet with Rubber Duck closed 74.7% of the performance gap between Sonnet and the more capable Opus tier. Source
  • Open

    API Authentication Bypass in FortiClient EMS 7.4.5-7.4.6–CVE-2026-35616
    Bishop Fox researchers expanded on Fortinet's disclosure of CVE-2026-35616 by identifying the root cause via the released hotfix.  ( 12 min )
  • Open

    PortSwigger partners with Meta Bug Bounty to empower bug hunters with training and Pro licenses
    More power for bug hunters An education-first approach to bug bounty Rewards on Meta's Bug Bounty Platform Our shared vision Ready to get started? We’re excited to announce a new partnership with Meta  ( 3 min )
  • Open

    What we learned about TEE security from auditing WhatsApp's Private Inference
    WhatsApp’s new “Private Inference” feature represents one of the most ambitious attempts to combine end-to-end encryption with AI-powered capabilities, such as message summarization. To make this possible, Meta built a system that processes encrypted user messages inside trusted execution environments (TEEs), secure hardware enclaves designed so that not even Meta can access the plaintext. Our now-public audit, conducted before launch, identified several vulnerabilities that compromised WhatsApp’s privacy model, all of which Meta has patched. Our findings show that TEEs aren’t a silver bullet: every unmeasured input and missing validation can become a vulnerability, and to securely deploy TEEs, developers need to measure critical data, validate and never trust any unmeasured data, and test…  ( 6 min )

  • Open

    The Attack Helix: Praetorian Guard’s AI Architecture for Offensive Security
    The Kill Chain models how an attack succeeds. The Attack Helix models how the offensive baseline improves. The Tipping Point One person. Two AI subscriptions. Ten government agencies. 150 gigabytes of sovereign data. In December of 2025, a single unidentified operator used Anthropic’s Claude and OpenAI’s ChatGPT to breach the Mexican government agencies and a financial institution. […] The post The Attack Helix: Praetorian Guard’s AI Architecture for Offensive Security appeared first on Praetorian.  ( 21 min )
  • Open

    AI Red Teaming Still Comes Back to Identity, Access, and Attack Paths
    Most enterprise AI system risk is not a novel model failure; it’s familiar security failure modes showing up in systems with broader access, more autonomy, and more ways to touch sensitive data. In this post, Russel Van Tuyl recaps his discussion with Patrick Gray of Risky Business on AI red teaming and why the fundamentals still matter. The post AI Red Teaming Still Comes Back to Identity, Access, and Attack Paths  appeared first on SpecterOps.  ( 15 min )
  • Open

    Mail-Advanced.ReadWrite permissions required to change sensitive email properties in Exchange Online via Graph API
    Microsoft announced a breaking change to the Microsoft Graph API affecting Exchange Online: from December 31, 2026, applications that modify sensitive email properties -- such as the subject, body, or recipients -- on delivered messages must hold elevated Mail-Advanced.ReadWrite permissions. Until now, the standard Mail.ReadWrite permission was sufficient for these operations. The new permissions require explicit approval from the tenant administrator ("admin consent"). If you operate Microsoft 365 and have custom applications or third-party tools that interact with email via the Graph API, you need to audit and potentially update these apps before the enforcement date. Source
  • Open

    Delivered by Trust: What the Axios Supply Chain Attack Means for Security Leaders
    A trusted package turned into an attacker’s gateway overnight. The Axios supply chain breach shows how quickly risk can spread—and why security leaders must rethink trust in modern development.  ( 7 min )

  • Open

    Azure Fabric Backdoor With A Twist
    Azure Fabric Backdoor With A Twist  ( 15 min )
    State of the Art of Private Key Security in Blockchain Ops - 4. Approvals and Policies
    State of the Art of Private Key Security in Blockchain Ops - 4. Approvals and Policies  ( 13 min )

  • Open

    A Look at RTEMS Security
    No content preview  ( 7 min )

  • Open

    When Guardrails Aren't Enough: Reinventing Agentic AI Security With Architectural Controls
    David Brauchler III delivers a fascinating Black Hat talk on the root cause of AI-based vulnerabilities and why security architecture is the real solution.  ( 7 min )

  • Open

    MCP Bridge Upgrade
    MCP Bridge Upgrade  ( 7 min )
    Black Hole of Trust: SEO Poisoning in Silver Fox’s Space Odyssey
    Black Hole of Trust: SEO Poisoning in Silver Fox’s Space Odyssey  ( 7 min )

  • Open

    State of the Art of Private Key Security in Blockchain Ops - 3. Private Key Storage and Signing Module
    State of the Art of Private Key Security in Blockchain Ops - 3. Private Key Storage and Signing Module  ( 12 min )

  • Open

    The Symbols of Operation
    The Symbols of Operation code data confusion ada lovelace  ( 6 min )

  • Open

    Public Report: AWS EKS Security Claims
    Public Report: AWS EKS Security Claims  ( 7 min )

  • Open

    Public Report: Google Private AI Compute Review
    Public Report: Google Private AI Compute Review  ( 7 min )

  • Open

    State of the Art of Private Key Security in Blockchain Ops - 2. Common Custody Solutions Architectures
    State of the Art of Private Key Security in Blockchain Ops - 2. Common Custody Solutions Architectures  ( 12 min )
    Legacy Technology in Transport: More Than “Old Tech”
    Legacy Technology in Transport: More Than “Old Tech”  ( 7 min )

  • Open

    Rapid Breach: Social Engineering to Remote Access in 300 Seconds
    No content preview  ( 14 min )
    State of the Art of Private Key Security in Blockchain Ops - 1. Concepts, Types of Wallets and Signing Strategies
    Concepts, Types of Wallets and Signing Strategies  ( 12 min )
    Bridging the Valley of Death
    Bridging the Valley of Death: How Assurance Takes Us from Proof of Concept to Minimum Viable Product  ( 7 min )
    Goal-Based Regulation
    Goal-Based Regulation  ( 7 min )
    Unmasking Techno Sophists
    Unmasking Techno Sophists  ( 6 min )
    Public Report: VetKeys Cryptography Review
    Public Report: VetKeys Cryptography Review  ( 7 min )
    Your point of departure for forensic readiness
    Your point of departure for forensic readiness - Digital Forensics Incident Response  ( 10 min )

  • Open

    Euro 7 Anti-tampering and the Expanding Cybersecurity Landscape
    Euro 7, Anti-tampering, and the Expanding Cybersecurity Landscape  ( 6 min )

  • Open

    Understanding the Impact of Ransomware on Patient Outcomes – Do We Know Enough?
    Discover how ransomware affects patient care, with insights from NCC Group on clinical vulnerabilities and sector trends.  ( 16 min )
    Android-KillPermAndSigChecks
    No content preview  ( 6 min )
    BlackBerry PlayBook Security – Part One
    No content preview  ( 7 min )
    Drupal Vulnerability
    No content preview  ( 8 min )
    Automated enumeration of email filtering solutions
    No content preview  ( 6 min )
    Pairing over BLS12-381, Part 3: Pairing!
    No content preview  ( 13 min )
    Java Web Start File Inclusion via System Properties Override
    This article details a vulnerability in Java Web Start that allows file inclusion through manipulated system properties.  ( 10 min )
    Scenester – A Small Tool for Cross-Platform Web Application
    No content preview  ( 7 min )
    Tool Release – Ghostrings
    No content preview  ( 9 min )
    Tool: WStalker – an easy proxy to support Web API assessments
    No content preview  ( 8 min )
    Technical Advisory – Jitsi Meet Electron – Arbitrary Client Remote Code Execution (CVE-2020-27162)
    No content preview  ( 9 min )
    Tool Release: Blackbox iOS App Analysis with Introspy
    No content preview  ( 7 min )
    Passive Decryption of Ethereum Peer-to-Peer Traffic
    No content preview  ( 10 min )
    Hackproofing Lotus Domino Web Server
    Hackproofing Lotus Domino Web Server  ( 6 min )
    A Survey of Istio’s Network Security Features
    No content preview  ( 24 min )
    Time Trial: Racing Towards Practical Remote Timing Attacks
    No content preview  ( 6 min )
    Technical Advisory – Citrix Access Gateway Command Injection Vulnerability
    Explore how a command injection flaw in Citrix Access Gateway could allow attackers to execute arbitrary system commands.  ( 9 min )
    Principal Mapper (pmapper)
    No content preview  ( 7 min )
    Virtual Access Monitor Multiple SQL Injection Vulnerabilities
    No content preview  ( 6 min )
    General Data Protection Regulation: Knowing your data
    No content preview  ( 7 min )
    Work daily with enforced MFA-protected API access
    No content preview  ( 9 min )
    General Data Protection Regulation – are you ready?
    No content preview  ( 7 min )
    SnapMC skips ransomware, steals data
    No content preview  ( 10 min )
    IP-reputation-snort-rule-generator
    No content preview  ( 6 min )
    IAM user management strategy
    No content preview  ( 9 min )
    Research Blog Test Playground
    No content preview  ( 6 min )
    Public Report – BLST Cryptographic Implementation Review
    No content preview  ( 7 min )
    iOS User Enrollment and Trusted Certificates
    No content preview  ( 11 min )
    Internet of Things Security
    No content preview  ( 7 min )
    In-depth analysis of the new Team9 malware family
    No content preview
    North Korea’s Lazarus: their initial access trade-craft using social media and social engineering
    No content preview  ( 11 min )
    Autochrome
    No content preview  ( 7 min )
    Is this the real life? Is this just fantasy? Caught in a landslide, NoEscape from NCC Group
    No content preview  ( 11 min )
    Improving Software Security through C Language Standards
    No content preview
    MeshyJSON: A TP-Link tdpServer JSON Stack Overflow
    No content preview  ( 30 min )
    How-to: Importing WStalker CSV (and more) into Burp Suite via Import to Sitemap Extension
    No content preview  ( 8 min )
    Crave the Data: Statistics from 1,300 Phishing Campaigns
    No content preview
    Conference Talks – March 2022
    No content preview
    Whitepaper – Weaning the Web off of Session Cookies: Making Digest Authentication Viable
    No content preview
    Technical Advisory – DelTek Vision – Arbitrary SQL Execution (SQLi)
    No content preview
    iSEC Completes TrueCrypt Audit
    No content preview
    LDAPFragger: Bypassing network restrictions using LDAP attributes
    Discover how LDAPFragger uses LDAP attributes to evade network restrictions and exfiltrate data covertly.  ( 15 min )
    Whitepaper – Microcontroller Readback Protection: Bypasses and Defenses
    No content preview
    ISM RAT
    No content preview  ( 11 min )
    The Mobile Application Hacker’s Handbook
    No content preview  ( 6 min )
    Introducing Chuckle and the Importance of SMB Signing
    No content preview  ( 8 min )
    Advanced SQL Injection in SQL Server Applications
    Advanced SQL Injection in SQL Server Applications  ( 6 min )
    IAM user management strategy (part 2)
    No content preview  ( 10 min )
    Cisco ASA series part four: dlmalloc-2.8.x, libdlmalloc, & dlmalloc on Cisco ASA
    No content preview
    Conference Talks – December 2020
    No content preview
    Visualising Firewall Rulesets – Simplifying Firewall Administration and Spotting the Pivot Point
    No content preview
    Xendbg: A Full-Featured Debugger for the Xen Hypervisor
    No content preview
    Writing Secure ASP Scripts
    No content preview
    Whatsupgold Premium Directory traversal
    No content preview
    What the HEC? Security implications of HDMI Ethernet Channel and other related protocols
    No content preview
    whitebox
    No content preview
    Java RMI Registry.bind() Unvalidated Deserialization
    No content preview  ( 6 min )
    Hacking the Extensible Firmware Interface
    No content preview  ( 7 min )
    Premium Practical Law Content Gateway(2)
    No content preview  ( 6 min )
    Technical Advisory: Multiple Vulnerabilities in Kyocera Printers
    No content preview  ( 12 min )
    Modelling Threat Actor Phishing Behaviour
    No content preview  ( 7 min )
    Technical Advisory – Multiple Vulnerabilities in Netgear ProSAFE Plus JGS516PE / GS116Ev2 Switches
    No content preview  ( 19 min )
    Tool Release: PeachFarmer
    No content preview
    Tool Release: A Simple DLL Injection Utility
    No content preview
    Whitepaper – Practical Attacks on Machine Learning Systems
    No content preview
    Tool Release – JWT-Reauth
    No content preview
    Tool Release – ScoutSuite 5.9.0
    No content preview
    The L4m3ne55 of Passw0rds: Notes from the field
    No content preview
    The Paillier Cryptosystem with Applications to Threshold ECDSA
    No content preview
    Technical Advisory: Shell Injection in SourceTree
    No content preview
    Technical Advisory: Administrative Passcode Recovery and Authenticated Remote Buffer Overflow Vulnerabilities in Gigaset DX600A Handset (CVE-2021-25309, CVE-2021-25306)
    No content preview
    Technical Advisory: Heartbleed chained with a Pass-the-Hash attack leads to device compromise on TP-Link C200 IP Camera
    No content preview
    Technical Advisory: Multiple Vulnerabilities in Accellion File Transfer Appliance
    No content preview
    Symantec Backup Exec 2012 – Linux Backup Agent Heap Overflow
    No content preview  ( 7 min )
    Research Insights Volume 9 – Modern Security Vulnerability Discovery
    No content preview
    Symantec Message Filter Unauthenticated verbose software version information disclosure
    No content preview
    Symantec Messaging Gateway Easy CSRF to add a backdoor-administrator (for example)
    No content preview
    Security First Umbrella
    No content preview
    Sharkbot is back in Google Play
    No content preview
    Spy-Pi: Do you trust your laptop docking stations?
    No content preview
    Technical Advisory – playSMS Pre-Authentication Remote Code Execution (CVE-2020-8644)
    No content preview
    Use of Deserialisation in .NET Framework Methods and Classes
    No content preview  ( 7 min )
    log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
    A practical approach to neutralizing Log4j’s JNDI vulnerability without upgrading the entire library.  ( 12 min )
    WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group
    No content preview  ( 20 min )
    Public Report – Matrix Olm Cryptographic Review
    No content preview  ( 7 min )
    Tool Release – Web3 Decoder Burp Suite Extension
    No content preview  ( 9 min )
    NCC Group Research at Black Hat USA 2022 and DEF CON 30
    No content preview
    Nerve
    No content preview
    POC2021 – Pwning the Windows 10 Kernel with NTFS and WNF Slides
    No content preview
    Technical Advisory: CyberArk EPM Non-paged Pool Buffer Overflow
    No content preview  ( 8 min )
    Shocker
    No content preview  ( 6 min )
    Solaris 11 USB Hub Class descriptor kernel stack overflow
    No content preview  ( 8 min )
    WSMap
    No content preview  ( 6 min )
    Vehicle Emissions and Cyber Security
    No content preview  ( 9 min )
    Threat Modelling Cloud Platform Services by Example: Google Cloud Storage
    No content preview  ( 19 min )
    Lending a hand to the community – Covenant v0.7 Updates
    No content preview
    Memory Gap
    No content preview
    Multiple Buffer Overflows Discovered in AFFLIB
    No content preview
    LibAVCodec AMV Out of Array Write
    No content preview
    McAfee Email and Web Security Appliance Active session tokens of other users are disclosed within the UI
    No content preview
    McAfee Email and Web Security Appliance Arbitrary file download is possible with a crafted URL, when logged in as any user
    No content preview
    Microsoft Zero-Day Vulnerability – OLE2Link – Threat Intelligence and Signatures
    No content preview
    libtalloc: A GDB plugin for analysing the talloc heap
    No content preview
    Analysis of setting cookies for third party websites in different browsers
    No content preview  ( 10 min )
    Writing FreeBSD Kernel Modules in Rust
    No content preview  ( 16 min )
    Introduction to AWS Attribute-Based Access Control
    No content preview  ( 17 min )
    Threats and vulnerabilities within the Maritime and shipping sectors
    No content preview  ( 6 min )
    Comparing AI Against Traditional Static Analysis Tools to Highlight Buffer Overflows
    No content preview  ( 12 min )
    Understanding the insider threat & how to mitigate it
    No content preview  ( 7 min )
    Tool Release: You’ll Never (Ever) Take Me Alive!
    No content preview  ( 7 min )
    Image IO Memory Corruption
    No content preview  ( 6 min )
    Phishing Mitigations: Configuring Microsoft Exchange to Clearly Identify External Emails
    No content preview  ( 10 min )
    Windows IPC Fuzzing Tools
    No content preview  ( 6 min )
    Public Report – Android Cloud Backup/Restore
    No content preview  ( 7 min )
    Flash local-with-filesystem Bypass in navigateToURL
    No content preview  ( 6 min )
    ncccodenavi
    No content preview  ( 7 min )
    Premium Content Gateway
    No content preview  ( 6 min )
    Public Report – Caliptra Security Assessment
    No content preview  ( 8 min )
    Network Attached Security: Attacking a Synology NAS
    No content preview  ( 7 min )
    Technical Advisory – Lenovo ImController Local Privilege Escalation (CVE-2021-3922, CVE-2021-3969)
    No content preview  ( 9 min )
    CVE-2018-8611 Exploiting Windows KTM Part 1/5 – Introduction
    Explore the introduction to exploiting CVE-2018-8611 in Windows Kernel Transaction Manager (KTM) with NCC Group’s expert analysis.  ( 23 min )
    Tool Release – HTTPSignatures: A Burp Suite Extension Implementing HTTP Signatures
    No content preview  ( 12 min )
    An Introduction to Authenticated Encryption
    No content preview  ( 6 min )
    Technical Advisory: Multiple Vulnerabilities in TCPDF
    No content preview  ( 12 min )
    iSEC Engages in TrueCrypt Audit
    No content preview  ( 7 min )
    How we breach network infrastructures and protect them
    No content preview  ( 6 min )
    Conference Talks – March 2020
    No content preview  ( 9 min )
    SysAid Helpdesk stored XSS
    No content preview  ( 6 min )
    Public Report – Google Enterprise API Security Assessment
    No content preview  ( 7 min )
    USB Undermining Security Barriers:further adventures with USB
    No content preview  ( 6 min )
    Impersonating Gamers With GPT-2
    No content preview  ( 19 min )
    Advisory-CraigSBlackie-CVE-2016-9795
    No content preview
    Compromising a Hospital Network for £118 (Plus Postage & Packaging)
    This post reveals how a simulated attack demonstrated the ease of breaching hospital systems using basic resources.  ( 13 min )
    Analyzing Secure AI Design Principles
    No content preview  ( 17 min )
    Introduction to Anti-Fuzzing: A Defence in Depth Aid
    Learn how anti-fuzzing techniques enhance defence-in-depth strategies and protect applications from fuzzing-based vulnerabilities.  ( 13 min )
    Public Report - VeChainThor Galactica Security Assessment
    No content preview  ( 6 min )
    ICS/OT Security & the evolution of the Purdue Model: Integrating Industrial and Business Networks
    No content preview  ( 7 min )
    Research Insights Volume 8 – Hardware Design: FPGA Security Risks
    No content preview  ( 7 min )
    Remote code execution in ImpressPages CMS
    Explore the remote code execution flaw in ImpressPages CMS and learn best practices for vulnerability remediation.  ( 7 min )
    Webinar: SMACK, SKIP-TLS & FREAK SSL/TLS vulnerabilities
    No content preview  ( 6 min )
    White Paper: Cryptopocalypse Reference Paper
    No content preview  ( 7 min )
    Quantum Data Centre of the Future
    No content preview  ( 10 min )
    Research Paper – Recovering deleted data from the Windows registry
    Learn how forensic techniques can recover deleted entries from the Windows Registry for investigation and analysis.  ( 7 min )
    My Hash is My Passport: Understanding Web and Mobile Authentication
    No content preview  ( 7 min )
    Nessus Authenticated Scan – Local Privilege Escalation
    No content preview  ( 6 min )
    Manifest Explorer
    No content preview  ( 7 min )
    Cleaning Up After Cookies
    No content preview  ( 6 min )
    Announcing NCC Group’s Cryptopals Guided Tour!
    No content preview  ( 10 min )
    Tool Release: SSL pinning bypass and other Android tools
    No content preview  ( 7 min )
    Demystifying Multivariate Cryptography
    Discover how multivariate cryptography fits into the future of secure communications and what makes it unique among quantum-safe algorithms.  ( 21 min )
    Cross-Execute Your Linux Binaries, Don’t Cross-Compile Them
    No content preview  ( 11 min )
    SMB hash hijacking & user tracking in MS Outlook
    Understand the mechanics behind SMB hash hijacking and user tracking in MS Outlook. Our advisory covers attack vectors, testing methods, and fixes.  ( 12 min )
    Defending Your Directory: An Expert Guide to Securing Active Directory Against DCSync Attacks
    No content preview  ( 10 min )
    Rustproofing Linux (Part 1/4 Leaking Addresses)
    No content preview  ( 14 min )
    Threat Spotlight – Hydra
    No content preview  ( 12 min )
    Use and enforce Multi-Factor Authentication
    No content preview  ( 9 min )
    Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling (1)
    No content preview  ( 18 min )
    Technical Advisory: Authentication rule bypass
    No content preview  ( 8 min )
    Rust for Security and Correctness in the embedded world
    No content preview  ( 13 min )
    Technical Advisory – OpenOffice.org Multiple Memory Corruption Vulnerabilities
    Discover how attackers could exploit memory handling flaws in OpenOffice.org to compromise system integrity and user safety.  ( 9 min )
    Non-Deterministic Nature of Prompt Injection
    No content preview  ( 9 min )
    Reverse Engineering Coin Hunt World’s Binary Protocol
    No content preview  ( 29 min )
    HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack
    No content preview  ( 7 min )
    In-Depth Technical Analysis of the Bybit Hack
    Explore a detailed breakdown of the Bybit hack, uncovering attack methods, vulnerabilities, and security lessons learned.  ( 15 min )
    iOS MobileSlideShow USB Image Class arbitrary code execution.txt
    No content preview  ( 6 min )
    NCC Group’s 2024 Annual Research Report
    No content preview  ( 7 min )
    Android-SSL-TrustKiller
    No content preview  ( 6 min )
    Symantec Backup Exec 2012 – Backup Exec Utility Stored XSS when adding Groups, Servers and Computers
    No content preview  ( 7 min )
    Whitepaper – XML Schema, DTD, and Entity Attacks: A Compendium of Known Techniques
    Explore known XML-based attack methods including DTD abuse, schema exploits, and entity expansion vulnerabilities.  ( 7 min )
    Public Report – WhatsApp opaque-ke Cryptographic Implementation Review
    No content preview  ( 7 min )
    Violating Database – Enforced Security Mechanisms
    No content preview  ( 7 min )
    Sakula: an adventure in DLL planting
    No content preview  ( 8 min )
    grepify
    No content preview  ( 6 min )
    Public Report – Kubernetes 1.24 Security Audit
    No content preview  ( 7 min )
    Nagios XI Network Monitor Blind SQL Injection
    Nagios XI Network Monitor is vulnerable to blind SQL injection. Learn the impact, exploitation risks, and mitigation steps.  ( 7 min )
    Lumension Device Control Remote Memory Corruption
    No content preview  ( 6 min )
    The ABCs of NFC chip security
    A technical overview of NFC chip vulnerabilities and protection strategies for secure communication.  ( 15 min )
    New Sources of Microsoft Office Metadata – Tool Release MetadataPlus
    No content preview  ( 11 min )
    Exploiting the Sudo Baron Samedit vulnerability (CVE-2021-3156) on VMWare vCenter Server 7.0
    Learn why CVE-2021-3156 poses a threat to VMware vCenter and how to protect your infrastructure from attacks.  ( 30 min )
    Top of the Pops: Three common ransomware entry techniques
    No content preview  ( 9 min )
    Signaturing an Authenticode anomaly with Yara
    Explore how Yara can detect Authenticode timestamp anomalies in PE files and enhance malware analysis.  ( 10 min )
    A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
    No content preview  ( 17 min )
    ProxMon
    No content preview  ( 7 min )
    Decoder Improved Burp Suite plugin release part two
    No content preview  ( 9 min )
    Technical Advisory: Ruby on Rails – Possible XSS Vulnerability in ActionView tag helpers (CVE-2022-27777)
    No content preview  ( 9 min )
    Retro Gaming Vulnerability Research: Warcraft 2
    No content preview  ( 18 min )
    RIFT: Detection capabilities for recent F5 BIG-IP/BIG-IQ iControl REST API vulnerabilities CVE-2021-22986
    No content preview  ( 11 min )
    Sifting through the spines: identifying (potential) Cactus ransomware victims
    No content preview  ( 12 min )
    A deeper dive into CVE-2021-39137 – a Golang security bug that Rust would have prevented
    No content preview  ( 12 min )
    A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM
    No content preview  ( 10 min )
    Turla PNG Dropper is back
    No content preview  ( 11 min )
    From ERMAC to Hook: Investigating the technical differences between two Android malware variants
    No content preview  ( 25 min )
    HTTP to MCP Bridge
    No content preview  ( 10 min )
    Technical Advisory: Pulse Connect Secure – RCE via Uncontrolled Gzip Extraction (CVE-2020-8260)
    No content preview  ( 10 min )
    A Brief Review of Bitcoin Locking Scripts and Ordinals
    No content preview  ( 16 min )
    The Extended AWS Security Ramp-Up Guide
    No content preview  ( 13 min )
    Technical Advisory – wolfSSL TLS 1.3 Client Man-in-the-Middle Attack (CVE-2020-24613)
    No content preview  ( 8 min )
    Tool Release – Solitude: A privacy analysis tool
    No content preview  ( 9 min )
    Machine Learning for Static Analysis of Malware – Expansion of Research Scope
    No content preview  ( 17 min )
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 9: Adventures with Expert Systems
    No content preview  ( 13 min )
    Fuzzing RTSP to discover an exploitable vulnerability in VLC
    Discover how fuzzing RTSP streams uncovered vulnerabilities in VLC and advanced secure software development.  ( 11 min )
    Tracking a P2P network related to TA505
    No content preview  ( 15 min )
    Ivanti Zero Day – Threat Actors observed leveraging CVE-2021-42278 and CVE-2021-42287 for quick privilege escalation to Domain Admin
    No content preview  ( 8 min )
    Defeating Windows DEP With A Custom ROP Chain
    No content preview  ( 27 min )
    RIFT: F5 Networks K52145254: TMUI RCE vulnerability CVE-2020-5902 Intelligence
    Insights from honeypot research on F5 TMUI RCE vulnerability. Understand attack patterns and steps to strengthen your security posture.  ( 14 min )
    Hardware & Embedded Systems: A little early effort in security can return a huge payoff
    Discover how early-stage security planning in hardware and embedded systems can dramatically reduce attack surfaces.  ( 12 min )
    NSA & CISA Kubernetes Security Guidance – A Critical Review
    No content preview  ( 16 min )
    Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
    No content preview  ( 15 min )
    Adventures in Xen Exploitation
    No content preview
    Live Incident Blog: June Global Ransomware Outbreak
    No content preview  ( 10 min )
    A brief look at Windows telemetry: CIT aka Customer Interaction Tracker
    A brief look at Windows telemetry: CIT aka Customer Interaction Tracker  ( 24 min )
    DataArmor Full Disk Encryption 3.0.12c – Restricted Environment breakout, Privilege Escalation and Full Disk Decryption
    No content preview
    Cisco IPSec VPN Implementation Group Name Enumeration
    No content preview
    Best practices with BYOD
    No content preview
    Black Hat 2013 – Bluetooth Smart Presentation Available
    No content preview
    Attacking the Windows Kernel (Black Hat Las Vegas 2007)
    No content preview
    A Peek Behind the Great Firewall of Russia
    No content preview
    Back Office Web Administration Authentication Bypass
    No content preview
    Apple CoreAnimation Heap Overflow
    No content preview
    A Simple and Practical Approach to Input Validation
    No content preview
    A Guide to Improving Security Through Infrastructure-as-Code
    No content preview
    Blackbox iOS App Assessments Using idb
    No content preview
    Apple QuickTime Player m4a Processing Buffer Overflow
    No content preview
    Abusing Privileged and Unprivileged Linux Containers
    No content preview
    Blind Security Testing – An Evolutionary Approach
    No content preview
    BlackBerry Link WebDav Server Bound to the BlackBerry VPN Adapter
    No content preview
    Apple Mac OS X ImageIO TIFF Integer Overflow
    No content preview
    Advanced Exploitation of Oracle PL/SQL Flaws
    No content preview
    Broadcasting your attack – DAB security
    No content preview
    Best Practices for the use of Static Code Analysis within a Real-World Secure Development Lifecycle
    No content preview
    A jq255 Elliptic Curve Specification, and a Retrospective
    No content preview
    BAT: a Fast and Small Key Encapsulation Mechanism
    No content preview
    AutoRepeater: Automated HTTP Request Repeating With Burp Suite
    No content preview
    Are you oversharing (in Salesforce)? Our new tool could sniff it out!
    No content preview
    Curve9767 and Fast Signature Verification
    No content preview
    Cisco ASA series part seven: Checkheaps
    No content preview
    Apache Struts Vulnerability
    No content preview
    Automating extraction from malware and recent campaign analysis
    No content preview
    Automated Reverse Engineering of Relationships Between Data Structures in C++ Binaries
    No content preview
    Assessing the security and privacy of Vaccine Passports
    No content preview
    CowCloud
    No content preview
    Content Security Policies Best Practices
    No content preview
    Call Map: A Tool for Navigating Call Graphs in Python
    No content preview
    Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign
    No content preview
    Critical Risk Vulnerability in SAP Message Server (Heap Overflow)
    No content preview
    Authorisation
    No content preview
    Android Cloud Backup/Restore
    No content preview
    Cups-filters remote code execution
    No content preview
    Attacking Web Service Security: Message Oriented Madness, XML Worms and Web Service Security Sanity
    No content preview
    Android-OpenDebug
    No content preview
    Azucar
    No content preview
    AssetHook
    No content preview
    Apple OSX/iPhone iOS ImageIO TIFF getBandProcTIFF TileWidth Heap Overflow
    No content preview
    An Introduction to Quantum Computing for Security Professionals
    No content preview
    Common Security Issues in Financially-Oriented Web Applications
    No content preview
    Bypassing Oracle DBMS_ASSERT (in certain situations)
    No content preview
    Berserko: Kerberos Authentication for Burp Suite
    No content preview
    cisco-SNMP-enumeration
    No content preview
    Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures
    No content preview
    Anti Brute Force Resource Metering
    No content preview
    Cyber Essentials Scheme
    No content preview
    Black Hat USA 2015 presentation: Broadcasting your attack-DAB security
    No content preview
    APT15 is Alive and Strong: An Analysis of RoyalCli and RoyalDNS
    No content preview
    CVE-2017-8570 RTF and the Sisfader RAT
    No content preview
    Compromising Apache Tomcat via JMX access
    No content preview
    Breaking Pedersen Hashes in Practice
    No content preview
    Advice for security decision makers contemplating the value of Antivirus
    No content preview
    Cisco ASA series part one: Intro to the Cisco ASA
    No content preview
    Check out our new Microcorruption challenges!
    No content preview
    Beyond data loss prevention
    No content preview
    Celebrating NCC Con Europe 2018
    No content preview
    Building an RDP Credential Catcher for Threat Intelligence
    No content preview
    Buffer Underruns, DEP, ASLR and improving the Exploitation Prevention Mechanisms (XPMs) on the Windows platform
    No content preview
    Cyber Security of New Space Paper
    No content preview
    Breaking into Security Research at NCC Group
    No content preview
    Assuring Your DDoS Defences
    No content preview
    Critical Risk Vulnerability in Ingres (Pointer Overwrite 2)
    No content preview
    creep-web-app-scanner
    No content preview
    C Language Standards Update – Zero-size Reallocations are Undefined Behavior
    No content preview
    Creating a Safer OAuth User Experience
    No content preview
    Conference Talks – November 2020
    No content preview
    Climbing Mount Everest: Black-Byte Bytes Back?
    No content preview
    CertPortal: Building Self-Service Secure S/MIME Provisioning Portal
    No content preview
    D-LINK DIR-850L web admin interface vulnerable to stack-based buffer overflow
    No content preview
    Conference Talks – November 2021
    No content preview
    Conference Talks – June 2022
    No content preview
    Command Injection in XML Signatures and Encryption
    No content preview
    Cisco VPN Client Privilege Escalation
    No content preview
    Bypassing Android’s Network Security Configuration
    No content preview
    Batten down the hatches: Cyber threats facing DP operations
    No content preview
    Archived Technical Advisories
    No content preview
    Conference Talks – October 2021
    No content preview
    Building WiMap the Wi-Fi Mapping Drone
    No content preview
    ASP.NET Security and the Importance of KB2698981 in Cloud Environments Threat Brief
    No content preview
    Data-mining with SQL Injection and Inference
    No content preview
    Critical Risk Vulnerability in SAP DB Web Server (Stack Overflow)
    No content preview
    Conti-nuation: methods and techniques observed in operations post the leaks
    No content preview
    AWS environment security assessment with Scout2
    No content preview
    Conference Talks – September 2020
    No content preview
    ASP.NET Security and the Importance of KB2698981 in Cloud Environments
    No content preview
    Announcing NCC Group’s Cryptopals Guided Tour: Set 2
    No content preview
    Adversarial Machine Learning: Approaches & defences
    No content preview
    Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG
    No content preview
    Cracking RDP NLA Supplied Credentials for Threat Intelligence
    No content preview
    Build Your Own Wi-Fi Mapping Drone Capability
    No content preview
    D-Link routers vulnerable to Remote Code Execution (RCE)
    No content preview
    Cracking Random Number Generators using Machine Learning – Part 2: Mersenne Twister
    No content preview
    Cisco ASA series part six: Cisco ASA mempools
    No content preview
    Business Insights: Cyber Security in the Financial Sector
    No content preview
    CMakerer: A small tool to aid CLion’s indexing
    No content preview
    CloudWatch: Amazon Web Services & Shellshock
    No content preview
    Black Hat 2013 – Cryptopocalypse Presentation Available
    No content preview
    Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
    No content preview
    Conference Talks – September/October 2022
    No content preview
    Cisco ASA series part two: Static analysis & datamining of Cisco ASA firmware
    No content preview
    Application Layer Attacks – The New DDoS Battleground
    No content preview
    Deception Engineering: exploring the use of Windows Installer Packages against first stage payloads
    No content preview
    DDoS Common Approaches and Failings
    No content preview
    Assessing Unikernel Security
    No content preview
    Code Patterns for API Authorization: Designing for Security
    No content preview
    Blind Return Oriented Programming
    No content preview
    BlackBerry PlayBook Security – Part Two – BlackBerry Bridge
    No content preview
    Conference Talks – June 2021
    No content preview
    BlackHat Asia USB Physical Access
    No content preview
    AtHoc Toolbar
    No content preview
    dotnetpaddingoracle
    No content preview
    Do not use your AWS root account
    No content preview
    Demystifying Cobalt Strike’s “make_token” Command
    No content preview
    Abusing Blu-ray Players Part 1 – Sandbox Escapes
    No content preview
    DARPA OnStar Vulnerability Analysis
    No content preview
    Cloud Security Presentation
    No content preview
    Cisco ASA series part five: libptmalloc gdb plugin
    No content preview
    eBook: Breach notification under GDPR – How to communicate a personal data breach
    No content preview
    Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server
    No content preview
    Attacks on SSL
    No content preview
    ASE 12.5.1 datatype overflow
    No content preview
    Detecting anomalous Vectored Exception Handlers on Windows
    No content preview
    Cyber Security in UK Agriculture
    No content preview
    Conference Talks – May 2021
    No content preview
    DECTbeacon
    No content preview
    Dangling Cursor Snarfing: A New Class of Attack in Oracle
    No content preview
    Conference Talks – October 2020
    No content preview
    CyberVillainsCA
    No content preview
    CVE-2018-8611 – Diving into the Windows Kernel Transaction Manager (KTM) for fun and exploitation
    No content preview
    Cross Site Request Forgery: An Introduction to a Common Web Application Weakness
    No content preview
    Common Insecure Practices with Configuring and Extending Salesforce
    No content preview
    Browser Extension Password Managers
    No content preview
    Cranim: A Toolkit for Cryptographic Visualization
    No content preview
    Black Hat Europe 2013 Andy Davis: To dock or not to dock…
    No content preview
    Creating Arbitrary Shellcode In Unicode Expanded Strings
    No content preview
    CECSTeR
    No content preview
    Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
    No content preview
    eBook – Do you know how your organisation would react in a real-world attack scenario?
    No content preview
    Database Security: A Christmas Carol
    No content preview
    Analysing a recent Poison Ivy sample
    No content preview
    Eurocrypt 2023: Death of a KEM
    No content preview
    Decoder Improved Burp Suite plugin release part one
    No content preview
    Exploiting CVE-2015-2426, and How I Ported it to a Recent Windows 8.1 64-bit
    No content preview
    End-of-life pragmatism
    No content preview
    Demystifying AWS’ AssumeRole and sts:ExternalId
    No content preview
    Public Report – AWS Nitro System API & Security Claims Italian
    No content preview  ( 7 min )
    The Browser Hacker’s Handbook
    No content preview  ( 6 min )
    My name is Matt – My voice is my password
    No content preview  ( 7 min )
    NCC Group’s Jeremy Boone recognized for Highest Quality and Most Eligible Reports through the Intel Circuit Breaker program
    No content preview  ( 7 min )
    Technical Advisory: Multiple Vulnerabilities in Brother Printers
    No content preview  ( 9 min )
    Developing Secure Mobile Applications for Android
    No content preview  ( 6 min )
    Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions 2013
    No content preview  ( 7 min )
    Technical Advisory – Linksys WRT160NL – Authenticated Remote Buffer Overflow (CVE-2020-26561)
    No content preview  ( 7 min )
    CERT Oracle Secure Coding Standard for Java
    No content preview  ( 6 min )
    Public Report – Zcash FROST Security Assessment
    No content preview  ( 6 min )
    osquery Application Security Assessment Public Report
    No content preview  ( 6 min )
    Applying normalised compression distance for architecture classification
    No content preview  ( 7 min )
    The disadvantages of a blacklist-based approach to input validation
    No content preview  ( 7 min )
    SecureCookies
    No content preview  ( 6 min )
    The CIS Security Standard for Docker available now
    No content preview  ( 8 min )
    Welcome to the new NCC Group Global Research blog
    No content preview  ( 6 min )
    Nagios XI Network Monitor – OS Command Injection
    No content preview  ( 7 min )
    Grepify – a Small Tool for Code Reviewers
    No content preview  ( 7 min )
    Tool Release: SSLyze v 0.9 released – Heartbleed edition
    No content preview  ( 7 min )
    The why behind web application penetration test prerequisites
    NCC Group explains why pen test prerequisites are essential for accurate, efficient, and secure web application assessments.  ( 7 min )
    Tool Release: iOS Secure State Preservation
    No content preview  ( 7 min )
    Technical Advisory: Gaining root access on Sumpple S610 IP Camera via Telnet; and Unprotected client and server data transmission between Android and IOS clients
    No content preview  ( 9 min )
    SOC maturity & capability
    No content preview  ( 7 min )
    Intent Fuzzer
    No content preview  ( 7 min )
    Freddy: An extension for automatically identifying deserialisation issues in Java and .NET applications
    No content preview  ( 7 min )
    Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP
    No content preview  ( 6 min )
    Public Report – go-cose Security Assessment
    No content preview  ( 7 min )
    The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
    No content preview  ( 7 min )
    Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel
    No content preview  ( 7 min )
    Securing the continuous integration process
    No content preview  ( 7 min )
    Technical Advisory – New York State Excelsior Pass Vaccine Passport Credential Forgery
    No content preview  ( 8 min )
    E-mail Spoofing and CDONTS.NEWMAIL
    E-mail Spoofing and CDONTS.NEWMAIL  ( 7 min )
    Technical Advisory: SQL Injection and Reflected Cross-Site Scripting (XSS) Vulnerabilities in Oracle Communications Diameter Signaling Router (CVE-2020-14787, CVE-2020-14788)
    No content preview  ( 8 min )
    Payment Card Industry Data Security Standard (PCI DSS) A Navigation and Explanation of Changes from v2.0 to v3.0
    No content preview  ( 6 min )
    Symantec Message Filter Session Hijacking via session
    No content preview  ( 6 min )
    Slotting Security into Corporate Development
    No content preview  ( 7 min )
    Forensic Readiness in Container Environments
    No content preview  ( 10 min )
    Public Report – Solana Program Library ZK-Token Security Assessment
    No content preview  ( 7 min )
    Public Report – Keyfork Implementation Review
    No content preview  ( 7 min )
    They Ought to Know Better: Exploiting Security Gateways via their Web Interfaces
    No content preview  ( 6 min )
    Technical Advisory – KwikTag Web Admin Authentication Bypass
    No content preview  ( 8 min )
    SysPWN – VR for Pwn2Own
    No content preview  ( 7 min )
    Oracle 11g TNS listener remote Invalid Pointer Read
    No content preview  ( 6 min )
    Chainspotting 2: The Unofficial Sequel to the 2018 Talk "Chainspotting" - OffensiveCon 2025
    No content preview  ( 7 min )
    Secure Application Development on Facebook
    No content preview  ( 6 min )
    From CSV to CMD to qwerty
    No content preview  ( 11 min )
    Writing Exploits for Win32 Systems from Scratch
    No content preview  ( 54 min )
    Technical Advisory – Multiple vulnerabilities in Nuki smart locks (CVE-2022-32509, CVE-2022-32504, CVE-2022-32502, CVE-2022-32507, CVE-2022-32503, CVE-2022-32510, CVE-2022-32506, CVE-2022-32508, CVE-2022-32505)
    Learn about multiple CVEs affecting Nuki Smart Locks and how to mitigate security risks for connected home devices.  ( 21 min )
    LTair:  The LTE Air Interface Tool
    No content preview  ( 11 min )
    WebLogic Plugin HTTP Injection via Encoded URLs
    This technical advisory details how encoded URLs can be used to inject malicious HTTP headers in Oracle WebLogic Plug-in environments.  ( 12 min )
    The Sorry State of Aftermarket Head Unit Security
    No content preview  ( 16 min )
    Making New Connections – Leveraging Cisco AnyConnect Client to Drop and Run Payloads
    No content preview  ( 12 min )
    The Challenges of Fuzzing 5G Protocols
    No content preview  ( 16 min )
    Technical Advisory – SonicWall SMA 100 Series – Unauthenticated Arbitrary File Deletion
    No content preview  ( 10 min )
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 8: Development of Prototype #4 – Building on Takaesu’s Approach with Focus on XSS
    No content preview  ( 10 min )
    Avoiding Pitfalls Developing with Electron
    No content preview  ( 11 min )
    Public Report - Google Confidential Space Security Assessment
    No content preview
    Zcash Cryptography and Code Review
    No content preview
    Mallory: Transparent TCP and UDP Proxy
    No content preview
    GSM/GPRS Traffic Interception for Penetration Testing Engagements
    No content preview
    CERT C Secure Coding Standard
    No content preview
    TA505 exploits SolarWinds Serv-U vulnerability (CVE-2021-35211) for initial access
    No content preview
    Third party assurance
    No content preview
    WSSiP: A Websocket Manipulation Proxy
    No content preview
    5 MCP Security Tips
    No content preview
    Symantec Messaging Gateway SSH with backdoor user account + privilege escalation to root due to very old Kernel
    No content preview
    Technical Advisory – Multiple Vulnerabilities in Juplink RX4-1800 WiFi Router (CVE-2022-37413, CVE-2022-37414)
    No content preview
    Xen SMEP (and SMAP) Bypass
    No content preview
    NCC Group’s Exploit Development Capability: Why and What
    No content preview
    Technical Advisory: Nexpose Hard‐coded Java Key Store Passphrase Allows Decryption of Stored Credentials
    No content preview
    VMware Workstation Guest-to-Host Escape Exploit Development
    No content preview
    Conference Talks – December 2021
    No content preview
    Public Report – VPN by Google One: Technical Security & Privacy Assessment
    No content preview
    Multiple Shell Metacharacter Injections in AFFLIB
    No content preview
    Tool Release – Collaborator++
    No content preview
    Technical Advisory – Multiple Vulnerabilities in Nagios XI
    No content preview
    Weak Passwords Led to (SafePay) Ransomware…Yet Again
    No content preview
    Thin Clients: Slim Security
    No content preview
    Tor Browser Research Report Released
    No content preview
    Testing Two-Factor Authentication
    No content preview
    Defending Your Directory: An Expert Guide to Fortifying Active Directory Against LDAP Injection Threats
    No content preview
    WebSense content filter bypass when deployed in conjunction with Cisco filtering devices
    No content preview
    Public Report – Lantern and Replica Security Assessment
    No content preview
    Technical Advisory: Bypassing Workflows Protection Mechanisms – Remote Code Execution on SharePoint
    No content preview
    Constant-Time Data Processing At a Secret Offset, Privacy and QUIC
    No content preview
    The Pentesters Guide to Akamai
    No content preview
    Tool Release – ScoutSuite 5.12.0
    No content preview
    Cisco ASA series part three: Debugging Cisco ASA firmware
    No content preview
    SQL Server Security
    No content preview
    CVE-2018-8611 Exploiting Windows KTM Part 4/5 – From race win to kernel read and write primitive
    No content preview
    Blind Exploitation of Stack Overflow Vulnerabilities
    No content preview
    Public Report: WhatsApp Contacts Security Assessment
    No content preview
    Technical Advisory – Nullsoft Scriptable Installer System (NSIS) – Insecure Temporary Directory Usage
    No content preview
    Technical Advisory – HTC IQRD Android Permission Leakage
    No content preview
    CVE-2018-8611 Exploiting Windows KTM Part 3/5 – Triggering the race condition and debugging tricks
    No content preview
    Technical Advisory: Xiaomi 13 Pro Code Execution via GetApps DOM Cross-Site Scripting (XSS)
    No content preview
    Detecting and Hunting for the Malicious NetFilter Driver
    No content preview
    Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark
    No content preview
    Multiple Vulnerabilities in MailEnable
    No content preview
    The Dark Side: How Threat Actors Leverage AnyDesk for Malicious Activities
    No content preview
    PMKID Attacks: Debunking the 802.11r Myth
    No content preview
    Technical Advisory – Arbitrary Signature Forgery in Stark Bank ECDSA Libraries (CVE-2021-43572, CVE-2021-43570, CVE-2021-43569, CVE-2021-43568, CVE-2021-43571)
    No content preview
    Zulu
    No content preview
    FPGAs: Security Through Obscurity?
    No content preview
    Auditing K3s Clusters
    No content preview
    Oracle Forensics Part 1: Dissecting the Redo Logs
    No content preview
    Supply Chain Security Begins with Secure Software Development
    No content preview
    There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
    No content preview
    Technical Advisory: containerd – containerd-shim API Exposed to Host Network Containers (CVE-2020-15257)
    No content preview
    Post-exploiting a compromised etcd – Full control over the cluster and its nodes
    No content preview
    Technical Advisory – ParcelTrack sends all pasteboard data to ParcelTrack’s servers on startup
    No content preview
    earlyremoval, in the Conservatory, with the Wrench: Exploring Ghidra’s decompiler internals to make automatic P-Code analysis scripts
    No content preview
    iOS Application Security: The Definitive Guide for Hackers and Developers
    No content preview
    Stopping Automated Attack Tools
    No content preview
    VoIP Security Methodology and Results
    No content preview
    Secure Coding Rules for Java LiveLessons, Part 1
    No content preview
    Machine Learning 101: The Integrity of Image (Mis)Classification?
    No content preview
    Defending Your Directory: An Expert Guide to Mitigating Pass-the-Hash Attacks in Active Directory
    No content preview
    Wubes: Leveraging the Windows 10 Sandbox for Arbitrary Processes
    No content preview
    44Con2013Game
    No content preview
    Tool Update – ruby-trace: A Low-Level Tracer for Ruby
    No content preview
    Technical Advisory: Multiple Vulnerabilities in Ricoh Printers
    No content preview
    Real World Cryptography Conference 2023 – Part I
    No content preview
    Technical Advisory: Unauthenticated SQL Injection in Lansweeper
    No content preview
    Tis the Season to Be…
    No content preview
    U plug, we play
    No content preview
    White Paper: An Introduction to Authenticated Encryption
    No content preview
    Technical Advisory: Espressif Systems - ESP32 BluFi Reference Application Vulnerabilities
    No content preview
    Public Report – WhatsApp Auditable Key Directory (AKD) Implementation Review
    No content preview
    Public Report – Qredo Apache Milagro MPC Cryptographic Assessment
    No content preview
    SecureBigIP
    No content preview
    AWS Inventory: A tool for mapping AWS resources
    No content preview
    Public Report – Aleo snarkVM Implementation Review
    No content preview
    Public Report – Pixel 4/4XL and Pixel 4a ioXt Audit
    No content preview
    Tool Release – ScoutSuite 5.11.0
    No content preview
    Rise of the Sensors: Securing LoRaWAN Networks
    No content preview
    Local network compromise despite good patching
    No content preview
    The Next C Language Standard (C23)
    No content preview
    On Almost Signing Android Builds
    No content preview
    Username enumeration techniques and their value
    No content preview
    SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)
    No content preview
    Technical Advisory: PDFTron JavaScript URLs Allowed in WebViewer UI (CVE-2021-39307)
    No content preview
    Public Report – AWS Nitro System API & Security Claims
    No content preview
    Tool – Windows Executable Memory Page Delta Reporter
    No content preview
    Tool Release: Code Query (cq)
    No content preview
    Embedded Device Security Certifications
    No content preview
    Technical Advisory: Cross-Site Scripting in Umbraco Rich Text Display
    No content preview
    Private sector cyber resilience and the role of data diodes
    No content preview
    Python Class Informer: an IDAPython plugin for viewing run-time type information (RTTI)
    No content preview
    Exploiting MS15-061 Use-After-Free Windows Kernel Vulnerability
    No content preview
    Public Report: eBPF Verifier Code Review
    No content preview
    The factoring dead: Preparing for the cryptopocalypse
    No content preview
    Adobe flash sandbox bypass to navigate to local drives
    No content preview
    Handy guide to a new Fivehands ransomware variant
    No content preview
    BrokenPrint: A Netgear stack overflow
    No content preview
    Streamlining Global Automotive Cybersecurity Governance to Accelerate Innovation, Assurance, and Compliance
    No content preview
    Using AWS and Azure for Cost Effective Log Ingestion with Data Processing Pipelines for SIEMs
    No content preview
    Blue Coat BCAAA Remote Code Execution Vulnerability
    No content preview
    Public Report – O(1) Labs Mina Client SDK, Signature Library and Base Components Cryptography and Implementation Review
    No content preview
    Technical Advisory – Shop app sends pasteboard data to Shopify’s servers
    No content preview
    Technical Advisory – SonicWall SMA 100 Series – Unauthenticated Stored XSS
    No content preview
    The Case of Missing File Extensions
    No content preview
    eBPF Adventures: Fiddling with the Linux Kernel and Unix Domain Sockets
    No content preview
    House
    No content preview
    TPM Genie
    No content preview
    Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things
    No content preview
    Building Systems from Commercial Components
    No content preview
    Detecting and Protecting when Remote Desktop Protocol (RDP) is open to the Internet
    No content preview
    Unauthenticated XML eXternal Entity (XXE) vulnerability
    No content preview
    An Engineer’s View: Operational Technology
    No content preview
    NCLoader
    No content preview
    Treat your points as cash
    No content preview
    SysAid Helpdesk Pro – Blind SQL Injection
    No content preview
    There’s A Hole In Your SoC: Glitching The MediaTek BootROM
    No content preview
    Disabling Office Macros to Reduce Malware Infections
    No content preview
    Android Malware Vultur Expands Its Wingspan
    No content preview
    Technical Advisory – VMware Tools Multiple Vulnerabilities
    No content preview
    Building Security In: Software Penetration Testing
    No content preview
    A Census of Deployed Pulse Connect Secure (PCS) Versions
    No content preview
    Public Report – AWS Nitro System API & Security Claims Spanish
    No content preview
    Technical Advisory: Reflected Cross-Site Scripting (XSS) vulnerability in Jenkins Delivery Pipeline plugin
    No content preview
    Windows Phone 7 Application Security Survey
    No content preview
    Shining the Light on Black Basta
    No content preview
    Popping Blisters for research: An overview of past payloads and exploring recent developments
    No content preview
    Tool Release – Project Kubescout: Adding Kubernetes Support to Scout Suite
    No content preview
    Technical Advisory: SMB Hash Hijacking and User Tracking in MS Outlook
    No content preview
    Tattler
    No content preview
    Technical Advisory – Multiple Vulnerabilities in PandoraFMS Enterprise
    No content preview
    Public Report – Protocol Labs Groth16 Proof Aggregation: Cryptography and Implementation Review
    No content preview
    Technical Advisory – Kwikset/Weiser BLE Proximity Authentication in Kevo Smart Locks Vulnerable to Relay Attacks
    No content preview
    iSEC’s Analysis of Microsoft’s SDL and its ROI
    No content preview
    Social Engineering Penetration Testing
    No content preview
    Public Report – WhatsApp End-to-End Encrypted Backups Security Assessment
    No content preview
    Unmasking Lorenz Ransomware: A Dive into Recent Tactics, Techniques and Procedures
    No content preview
    Autonomous AI Agents: A hidden Risk in Insecure smolagents “CodeAgent” Usage
    No content preview
    Tool Release – insject: A Linux Namespace Injector
    No content preview
    Past, Present and Future of Effective C
    No content preview
    Technical Advisory: Insufficient Proxyman HelperTool XPC Validation
    No content preview
    Technical Advisory: Pulse Connect Secure – RCE via Uncontrolled Archive Extraction – CVE-2021-22937 (Patch Bypass)
    No content preview
    Tool Release – Socks Over RDP
    No content preview
    HDMI – Hacking Displays Made Interesting
    No content preview
    Trusted Gateway
    No content preview
    Windows 2000 Format String Vulnerabilities
    No content preview
    Whitepaper – HTTP Digest Integrity: Another look, in light of recent attacks
    No content preview
    Technical Advisory: Bypassing Microsoft XOML Workflows Protection Mechanisms using Deserialisation of Untrusted Data
    No content preview
    Zcash Overwinter Consensus and Sapling Cryptography Review
    No content preview
    Mallory and Me: Setting up a Mobile Mallory Gateway
    No content preview
    Tool Release – Enumerating Docker Registries with go-pillage-registries
    No content preview
    CVE-2018-8611 Exploiting Windows KTM Part 2/5 – Patch analysis and basic triggering
    No content preview
    Open Banking: Security considerations & potential risks
    No content preview
    Windows DACL Enum Project
    No content preview
    Analyzing Secure AI Architectures
    No content preview
    Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
    No content preview
    Tool Release: Cartographer
    No content preview
    Tool Release: Code Credential Scanner (ccs)
    No content preview
    Whitepaper – Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm’s TrustZone
    No content preview
    Proxying PyRIT for fun and profit
    No content preview
    NCC Group’s 2022 & 2023 Research Report
    No content preview
    Research Insights Volume 3 – How are we breaking in: Mobile Security
    No content preview
    The Update Framework (TUF) Security Assessment
    No content preview
    TLSPretense — SSL/TLS Client Testing Framework
    No content preview
    Real World Cryptography Conference 2024
    No content preview
    The 9 Lives of Bleichenbacher’s CAT: New Cache ATtacks on TLS Implementations
    No content preview
    Tool Release: DIBF Tool Suite
    No content preview
    Writing Small Shellcode
    No content preview
    Public Report – VPN by Google One Security Assessment
    No content preview
    Whitepaper – Double Fetch Vulnerabilities in C and C++
    No content preview
    The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems
    No content preview
    Threat Intelligence: Benefits for the Enterprise
    No content preview
    Online Casino Roulette – A guideline for penetration testers and security researchers
    No content preview
    Aurora Response Recommendations
    No content preview
    Kerberos Resource-Based Constrained Delegation: When an Image Change Leads to a Privilege Escalation
    No content preview
    Professional C Programming LiveLessons, (Video Training) Part I: Writing Robust, Secure, Reliable Code
    No content preview
    Adventures in the land of BumbleBee – a new malicious loader
    No content preview
    Inter-Protocol Exploitation
    No content preview
    Technical Advisory: Multiple Vulnerabilities in Lexmark Printers
    No content preview
    Using SharePoint as a Phishing Platform
    No content preview
    Technical Advisory: Unauthenticated Remote Command Execution through Multiple Vulnerabilities in Virgin Media Hub 3.0
    No content preview
    RomHack – Revving Up: The Journey to Pwn2Own Automotive 2024
    No content preview
    Technical Advisory – Pulse Connect Secure – RCE via Template Injection (CVE-2020-8243)
    No content preview
    The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
    No content preview
    Nine years of bugs at NCC Group
    No content preview
    Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin
    No content preview
    Windows 10 USB Mass Storage driver arbitrary code execution in kernel mode
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 10: Efficacy Demonstration, Project Conclusion and Next Steps
    No content preview
    VeChain JavaScript SDK Cryptography and Security Review
    No content preview
    Technical Advisory: Dell SupportAssist Local Privilege Escalation (CVE-2021-21518)
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 2: Going off on a Tangent – AI/ML Applications in Social Engineering
    No content preview
    xcavator
    No content preview
    Reverse engineering and decrypting CyberArk vault credential files
    No content preview
    Phishing Stories
    No content preview
    Technical Advisory: Code Execution by Unsafe Resource Handling in Multiple Microsoft Products
    No content preview
    The Development of a Telco Attack Testing Tool
    No content preview
    Technical Advisory – Multiple Vulnerabilities in Victure WR1200 WiFi Router (CVE-2021-43282, CVE-2021-43283, CVE-2021-43284)
    No content preview
    Technical Advisory – Linksys WRT160NL – Authenticated Command Injection (CVE-2021-25310)
    No content preview
    Trust in the Internet Survey
    No content preview
    The Database Hacker’s Handbook
    No content preview
    Oracle Java Installer Adds a System Path Which is Writable by All
    No content preview
    iSEC reviews SecureDrop
    No content preview
    Tool Release: Magisk Module – Conscrypt Trust User Certs
    No content preview
    Public Report – Security Review of RSA Blind Signatures with Public Metadata
    No content preview
    Technical Advisory – New York State Excelsior Pass Vaccine Passport Scanner App Sends Data to a Third Party not Specified in Privacy Policy
    No content preview
    Technical Advisory: Stored and Reflected XSS Vulnerability in Nagios Log Server (CVE-2021-35478,CVE-2021-35479)
    No content preview
    Tool Release – Winstrument: An Instrumentation Framework for Windows Application Assessments
    No content preview
    Pip3line – The Swiss Army Knife of Byte Manipulation
    No content preview
    Optimizing Pairing-Based Cryptography: Montgomery Multiplication in Assembly
    No content preview
    Toner Deaf – Printing your next persistence (Hexacon 2022)
    No content preview
    Understanding cyber risk management vs uncertainty with confidence in 2017
    No content preview
    Puckungfu 2: Another NETGEAR WAN Command Injection
    No content preview
    Padding the struct: How a compiler optimization can disclose stack memory
    No content preview
    Technical Advisory: Intel Driver Support & Assistance – Local Privilege Escalation
    No content preview
    Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling
    No content preview
    Masquerade: You Downloaded ScreenConnect not Grok AI!
    No content preview
    Oracle E-Business Suite Pre-Auth SQLi with DBA Privileges
    No content preview
    Tool Release – ICPin, an integrity-check and anti-debug detection pintool
    No content preview
    Fix Bounty
    No content preview
    Samsung Galaxy S24 Pwn2Own Ireland 2024
    No content preview
    Multiple Cisco CSS / ACE Client Certificate and HTTP Header
    No content preview
    NCC Group’s Juan Garrido named to Microsoft’s MSRC Office Security Researcher Leaderboard
    No content preview
    Security of Things: An Implementer’s Guide to Cyber Security for Internet of Things Devices and Beyond
    No content preview
    How Microsoft Office knows a document came from the Internet and might be dangerous
    No content preview
    Technical Advisory – Bomgar Remote Support – Local Privilege Escalation
    No content preview
    Technical Advisory: Mosquitto Broker DoS through a Memory Leak vulnerability
    No content preview
    Trust in the New Internet Survey
    No content preview
    NETGEAR Routers: A Playground for Hackers?
    No content preview
    RIFT: Citrix ADC Vulnerabilities CVE-2020-8193, CVE-2020-8195 and CVE-2020-8196 Intelligence
    No content preview
    Voice Impersonation and DeepFake Vishing in Realtime
    No content preview
    Potential false redirection of web site content in Internet in SAP NetWeaver web applications
    No content preview
    Jenkins Plugins and Core Technical Summary Advisory
    No content preview
    Technical Advisory – ICTFAX 7-4 – Indirect Object Reference
    No content preview
    Game Security
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 6: Development of Prototype #2 – Creating a SQLi PoC
    No content preview
    Public Report – Penumbra Labs Decaf377 Implementation and Poseidon Parameter Selection Review
    No content preview
    pySimReader
    No content preview
    Remote Exploitation of Microsoft Office DLL Hijacking (MS15-132) via Browsers
    No content preview
    Samba _netr_ServerPasswordSet Expoitability Analysis
    No content preview
    Bit51 Better Security WP Security Plugin – Unauthenticated Stored XSS to RCE
    No content preview
    The Future of C Code Review
    No content preview
    Whitepaper – Project Triforce: Run AFL On Everything (2017)
    No content preview
    Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
    No content preview
    Technical Advisory – Authenticated SQL Injection in SOAP Request in Broadcom CA Network Flow Analysis (CVE-2021-44050)
    No content preview
    State of DNS Rebinding in 2023
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 5: Development of Prototype #1 – Text Processing and Semantic Relationships
    No content preview
    Public Report – Zcash Zebra Security Assessment
    No content preview
    Symantec PC Anywhere Remote Code Extecution
    No content preview
    Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks
    No content preview
    Cisco ASA series part eight: Exploiting the CVE-2016-1287 heap overflow over IKEv1
    No content preview
    Software Verification and Analysis Using Z3
    No content preview
    10 real-world stories of how we’ve compromised CI/CD pipelines
    No content preview
    44CON Workshop – How to assess and secure iOS apps
    No content preview
    Log4Shell: Reconnaissance and post exploitation network detection
    No content preview
    Paradoxical Compression with Verifiable Delay Functions
    No content preview
    Symantec Messaging Gateway – Authenticated arbritary file download
    No content preview
    Technical Advisory: IP Office Stored Cross Site Scripting (XSS) Vulnerability
    No content preview
    BLEBoy
    No content preview
    Technical Advisory: Adobe ColdFusion RMI Registry.bind() Deserialisation RCE
    No content preview
    Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
    No content preview
    Absolute Security
    No content preview
    RM3 – Curiosities of the wildest banking malware
    No content preview
    Sysinternals SDelete: When Secure Delete Fails
    No content preview
    McAfee Email and Web Security Appliance v5.6 – Arbitrary file download is possible with a crafted URL, when logged in as any user
    No content preview
    Order Details Screens and PII
    No content preview
    Technical Advisory – macOS Installer Local Root Privilege Escalation (CVE-2020-9817)
    No content preview
    The facts about BadUSB
    No content preview
    Violating the Virtual Channel – RDP Testing
    No content preview
    Mining data from Cobalt Strike beacons
    No content preview
    Solaris 11 USB hubclass
    No content preview
    USB under the bonnet: Implications of USB security vulnerabilities in vehicle systems
    No content preview
    Multiple security vulnerabilities in SAP NetWeaver BSP Logon
    No content preview
    Whitepaper – A Tour of Curve 25519 in Erlang
    No content preview
    Salesforce Security with Remote Working
    No content preview
    tcpprox
    No content preview
    RIFT: F5 CVE-2020-5902 and Citrix CVE-2020-8193, CVE-2020-8195 and CVE-2020-8196 honeypot data release
    No content preview
    Hacking Appliances: Ironic exploits in security products
    No content preview
    Peeling back the layers on defence in depth…knowing your onions
    No content preview
    Technical Advisory – FUJITSU CentricStor Control Center <= V8.1 – Unauthenticated Command Injection ( CVE-2022-31794 and CVE-2022-31795)
    No content preview
    Technical Advisory – Open5GS Stack Buffer Overflow During PFCP Session Establishment on UPF (CVE-2021-41794)
    No content preview
    Tool Release: Redirecting traffic with dnsRedir.py
    No content preview
    Conference Talks – January 2020
    No content preview
    Project Triforce: Run AFL on Everything!
    No content preview
    Announcing the Cryptopals Guided Tour Video 17: Padding Oracles!
    No content preview
    The Demise of Signature Based Antivirus
    No content preview
    Technical Advisory – IBM WebSphere Commerce: Encrypted URL Parameter Vulnerable to Padding Oracle Attacks
    No content preview
    Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121)
    No content preview
    Research Insights Volume 2 – Defensive Trends
    No content preview
    Technical advisory: CVE-2017-8592 – XMLHttpRequest in IE followed 307 redirections with additional or customised headers
    No content preview
    Defending Your Directory: An Expert Guide to Fortifying Active Directory Certificate Services (ADCS) Against Exploitation
    No content preview
    Tool Release: YoNTMA
    No content preview
    Sign over Your Hashes – Stealing NetNTLM Hashes via Outlook Signatures
    No content preview
    Secure Coding in C and C++
    No content preview
    Rise of the machines: Machine Learning & its cyber security applications
    No content preview
    RokRat Analysis
    No content preview
    WebRATS
    No content preview
    Rustproofing Linux (Part 4/4 Shared Memory)
    No content preview
    Technical Advisory – Multiple HTML Injection Vulnerabilities in KaiOS Pre-installed Mobile Applications
    No content preview
    Oracle Gridengine sgepasswd Buffer Overflow
    No content preview
    Preparing for Cyber Battleships – Electronic Chart Display and Information System Security
    No content preview
    Technical Advisory: Sonos Era 100 Secure Boot Bypass Through Unchecked setenv() call
    No content preview
    Tool Release – ScoutSuite 5.10
    No content preview
    Windows USB RNDIS driver kernel pool overflow
    No content preview
    Replicating CVEs with KLEE
    No content preview
    Tool Release: Introducing opinel: Scout2’s favorite tool
    No content preview
    vlan-hopping
    No content preview
    Rustproofing Linux (Part 3/4 Integer Overflows)
    No content preview
    Vulnerabilities Found In Geofencing Apps
    No content preview
    WSBang
    No content preview
    YoNTMA
    No content preview
    Technical Advisory – Multiple Vulnerabilities in Trendnet TEW-831DR WiFi Router (CVE-2022-30325, CVE-2022-30326, CVE-2022-30327, CVE-2022-30328, CVE-2022-30329)
    No content preview
    Public Report: XMTP MLS Implementation Review
    No content preview
    Technical advisory: Remote shell commands execution in ttyd
    No content preview
    The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet
    No content preview
    Conference Talks – August 2020
    No content preview
    Tool Release: Sinking U-Boots with Depthcharge
    No content preview
    SmarterMail – Stored XSS in emails
    No content preview
    Microsoft Internet Explorer CMarkup Use-After-Free
    No content preview
    NCC Con Europe 2016
    No content preview
    Squiz CMS File Path Traversal
    No content preview
    Technical advisory: “ROHNP”- key extraction side channel in multiple crypto libraries
    No content preview
    Remote Directory Traversal and File Retrieval
    No content preview
    Security Compliance as an Engineering Discipline
    No content preview
    Testing Infrastructure-as-Code Using Dynamic Tooling
    No content preview
    umap
    No content preview
    Whitepaper – Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities
    No content preview
    Research Insights Volume 4 – Sector Focus: Maritime Sector
    No content preview
    Ruxcon 2013 – Introspy Presentation Slides
    No content preview
    Symantec Messaging Gateway Out of band stored XSS delivered by email
    No content preview
    HITBAMS – Your Not so “Home” Office – Soho Hacking at Pwn2Own
    No content preview
    Research Insights Volume 5 – Sector Focus: Automotive
    No content preview
    Technical Advisory – Apple macOS XAR – Arbitrary File Write (CVE-2022-22582)
    No content preview
    Understanding Ransomware
    No content preview
    ZigTools: An Open Source 802.15.4 Framework
    No content preview
    Technical Advisory: Adobe ColdFusion Object Deserialisation RCE
    No content preview
    Tool Release – shouganaiyo-loader: A Tool to Force JVM Attaches
    No content preview
    Tool Release: Exploring SSL Pinning on iOS
    No content preview
    TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus
    No content preview
    Threat Actors: exploiting the pandemic
    No content preview
    Sobelow: Static analysis for the Phoenix Framework
    No content preview
    WindowsJobLock
    No content preview
    Getting Shell with XAMLX Files
    No content preview
    Technical Advisory: Mitel MiVoice 5330e Memory Corruption Flaw
    No content preview
    McAfee Email and Web Security Appliance v5.6 – Session hijacking (and bypassing client-side session timeouts)
    No content preview
    SecureCisco
    No content preview
    The SSL Conservatory
    No content preview
    Nagios XI Network Monitor Stored and Reflected XSS
    No content preview
    Toxic Tokens: Using UUIDs for Authorization is Dangerous (even if they’re cryptographically random)
    No content preview
    Mobile World Congress – Mobile Internet of Things
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 4: Architecture and Design
    No content preview
    Social Engineering
    No content preview
    The role of security research in improving cyber security
    No content preview
    Tool Release – ScoutSuite 5.8.0
    No content preview
    How cryptography is used to monitor the spread of COVID-19
    No content preview
    McAfee Email and Web Security Appliance v5.6 – Active session tokens of other users are disclosed within the UI
    No content preview
    Technical Advisory – SonicWall SMA 100 Series – Unauthenticated File Upload Path Traversal (CVE-2021-20040)
    No content preview
    USB attacks need physical access right? Not any more…
    No content preview
    Research Insights Volume 6: Common Issues with Environment Breakouts
    No content preview
    Tool Release – Monkey365
    No content preview
    Whitepaper – A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator
    No content preview
    Machine Learning 103: Exploring LLM Code Generation
    No content preview
    Practical SME security on a shoestring
    No content preview
    Ransomware: How vulnerable is your system?
    No content preview
    Logs, Logs, the Audit Trail – Features of a Successful Log Management Solution
    No content preview
    SSLyze v0.8
    No content preview
    Striking Back at Retired Cobalt Strike: A look at a legacy vulnerability
    No content preview
    Tool Release – Principal Mapper v1.1.0 Update
    No content preview
    Microsoft’s SQL Server vs. Oracle’s RDBMS
    No content preview
    NCC Group Research at Black Hat USA 2021 and DEF CON 29
    No content preview
    On Multiplications with Unsaturated Limbs
    No content preview
    Securing PL/SQL Applications with DBMS_ASSERT
    No content preview
    An Adventure in Contingency Debugging: Ruby IO#read/IO#write Considered Harmful
    No content preview
    McAfee Email and Web Security Appliance v5.6 – Password hashes can be recovered from a system backup and easily cracked
    No content preview
    Tales of Windows detection opportunities for an implant framework
    No content preview
    Technical Advisory: Authentication Bypass in libSSH
    No content preview
    Much Ado About Hardware Implants
    No content preview
    New Attack Vectors and a Vulnerability Dissection of MS03-007
    No content preview
    Technical Advisory: Pulse Connect Secure – Arbitrary File Read via Logon Message (CVE-2020-8255)
    No content preview
    Pentesting V. Red Teaming V. Bug Bounty
    No content preview
    Proxy Re-Encryption Protocol: IronCore Public Report
    No content preview
    Tool Release – Socks Over RDP Now Works With Citrix
    No content preview
    Webinar: 4 Secrets to a Robust Incident Response Plan
    No content preview
    Real World Cryptography Conference 2021: A Virtual Experience
    No content preview
    Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns
    No content preview
    Tool Release: Calculating SQL Permissions
    No content preview
    Adobe Acrobat Reader XML Forms Data Format Buffer Overflow
    No content preview
    SecureIE.ActiveX
    No content preview
    Shellshock Advisory
    No content preview
    When a Trusted Site in Internet Explorer was Anything But
    No content preview
    Oracle 11g TNS listener remote Null Pointer Dereference
    No content preview
    Technical Advisory – SonicWall SMA 100 Series – Post-Authentication Remote Command Execution (CVE-2021-20044)
    No content preview
    Technical Advisory – NULL Pointer Derefence in McAfee Drive Encryption (CVE-2021-23893)
    No content preview
    OS X 10.6.6 Camera Raw Library Memory Corruption
    No content preview
    Technical Advisory – NXP i.MX SDP_READ_DISABLE Fuse Bypass (CVE-2022-45163)
    No content preview
    Windows Firewall Hook Enumeration
    No content preview
    Increased exploitation of Oracle GlassFish Server Administration Console Remote Authentication Bypass
    No content preview
    SysAid Helpdesk blind SQL injection
    No content preview
    The Automotive Threat Modeling Template
    No content preview
    Accessing Private Fields Outside of Classes in Java
    No content preview
    More Advanced SQL Injection
    No content preview
    Securing Teradata Database
    No content preview
    Software Security Austerity Security Debt in Modern Software Development
    No content preview
    Technical Advisory: Multiple Vulnerabilities in HP Printers
    No content preview
    Smuggling HTA files in Internet Explorer/Edge
    No content preview
    Technical Advisory – IBM TAM: Remote Directory Traversal and File Retrieval via web server plug-in
    No content preview
    Tool Release: iOS SSL Kill Switch v0.5 Released
    No content preview
    Ruling the rules
    No content preview
    Secure Session Management With Cookies for Web Applications
    No content preview
    SSLyze v0.7 Released
    No content preview
    Why AI Will Not Fully Replace Humans for Web Penetration Testing
    No content preview
    Rigging the Vote: Uniqueness in Verifiable Random Functions
    No content preview
    Software-Based Fault Injection Countermeasures (Part 2/3)
    No content preview
    Technical Advisory – Linux RDS Protocol Local Privilege Escalation
    No content preview
    NCC Group’s Upcoming Trainings at Black Hat USA 2021
    No content preview
    Research Insights Volume 1 – Sector Focus: Financial Services
    No content preview
    Updated: Technical Advisory and Proofs of Concept – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)
    No content preview
    How to Backdoor Diffie-Hellman
    No content preview
    Public Report: Aleo snarkOS Implementation and Consensus Mechanism Review
    No content preview
    Securing Google Cloud Platform – Ten best practices
    No content preview
    Technical Advisory – ExpressLRS vulnerabilities allow for hijack of control link
    No content preview
    Public cloud
    No content preview
    Symantec Messaging Gateway – Addition of a backdoor adminstrator via CSRF
    No content preview
    TANDBERG Video Communication Server Authentication Bypass
    No content preview
    HDMI Ethernet Channel
    No content preview
    Managing PowerShell in a modern corporate environment
    No content preview
    NCC Group placed first in global 5G Cyber Security Hack competition
    No content preview
    Symantec Backup Exec 2012 Backup/Restore Data Traverses Memory with Weak ACLs
    No content preview
    Ragweed
    No content preview
    Samba on the BlackBerry PlayBook
    No content preview
    Security Considerations of zk-SNARK Parameter Multi-Party Computation
    No content preview
    typofinder
    No content preview
    Reviewing Verifiable Random Functions
    No content preview
    Technical Advisory – Apple HFS+ Information Disclosure Vulnerability
    No content preview
    iOS SSL Killswitch
    No content preview
    Managing Cyber Risk in the Supply Chain
    No content preview
    SIAM AG23: Algebraic Geometry with Friends
    No content preview
    Improving your Network and Application Assurance Strategy in an environment of increasing 0day vulnerabilities
    No content preview
    Oracle Retail Integration Bus Manager Directory Traversal
    No content preview
    Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817
    No content preview
    Some Notes About the Xen XSA-122 Bug
    No content preview
    Microsoft SQL Server Passwords
    No content preview
    IAX Voice Over-IP Security
    No content preview
    Fuzzbox
    No content preview
    Login Service Security
    No content preview
    MSSQL Lateral Movement
    No content preview
    Nagios XI Network Monitor – Stored and Reflective XSS
    No content preview
    Non Obvious PE Parsers – The .NET runtime – Part 1
    No content preview
    Paper: Thematic for Success in Real-World Offensive Cyber Operations – How to make threat actors work harder and fail more often
    No content preview
    Alternative Approaches for Fault Injection Countermeasures (Part 3/3)
    No content preview
    NCC Con Europe 2022 – Pwn2Own Austin Presentations
    No content preview
    Protecting stored cardholder data (an unofficial supplement to PCI DSS V3.0)
    No content preview
    Whitepaper: Recognizing and Preventing TOCTOU
    No content preview
    Machine learning from idea to reality: a PowerShell case study
    No content preview
    metasploitavevasion
    No content preview
    A Back-to-Front TrueCrypt Recovery Story: The Plaintext is the Ciphertext
    No content preview
    Hacking Displays Made Interesting
    No content preview
    Lessons learned from 50 USB bugs
    No content preview
    Mergers & Acquisitions (M&A) cyber security due diligence
    No content preview
    tybocer
    No content preview
    Password and brute-force mitigation policies
    No content preview
    Post-quantum cryptography overview
    No content preview
    Real World Cryptography Conference 2022
    No content preview
    USB keyboards by post – use of embedded keystroke injectors to bypass autorun restrictions on modern desktop operating systems
    No content preview
    Spectre on a Television
    No content preview
    PhanTap (Phantom Tap): Making networks spookier one packet at a time
    No content preview
    Mature Security Testing Framework
    No content preview
    OS X Lion USB Hub Class Descriptor Arbitrary Code Execution
    No content preview
    Tool Release – ScoutSuite 5.13.0
    No content preview
    A New Flying Kitten?
    No content preview
    NX Server for Linux Arbitrary Files can be read with root privileges
    No content preview
    Variations in Exploit methods between Linux and Windows
    No content preview
    Optimum Routers: Researching Managed Routers
    No content preview
    McAfee Email and Web Security Appliance Password hashes can be recovered from a system backup and easily cracked
    No content preview
    NIST Selects Post-Quantum Algorithms for Standardization
    No content preview
    Microsoft announces the WMIC command is being retired, Long Live PowerShell
    No content preview
    Technical Advisory: Citrix Workspace / Receiver Remote Code Execution Vulnerability
    No content preview
    On Linux’s Random Number Generation
    No content preview
    The death of USB autorun and the rise of the USB keyboard
    No content preview
    UK government cyber security guidelines for connected & autonomous vehicles
    No content preview
    Tool Release: SSLyze v0.8 released
    No content preview
    Optimizing Pairing-Based Cryptography: Montgomery Arithmetic in Rust
    No content preview
    Practical Machine Learning for Random (Filename) Detection
    No content preview
    McAfee Email and Web Security Appliance Any logged-in user can bypass controls to reset passwords of other administrators
    No content preview
    G-Scout
    No content preview
    An Adaptive-Ciphertext Attack Against “I ⊕ C” Block Cipher Modes With an Oracle
    No content preview
    Multiple Format String Injections in AFFLIB
    No content preview
    Premium Security Content Gateway
    No content preview
    Machine Learning 104: Breaking AES With Power Side-Channels
    No content preview
    Shell Arithmetic Expansion and Evaluation Abuse
    No content preview
    Integrating DigitalOcean into ScoutSuite
    No content preview
    Lumension Device Control (formerly Sanctuary) remote memory corruption
    No content preview
    Technical Advisory – Jitsi Meet Electron – Limited Certificate Validation Bypass (CVE-2020-27161)
    No content preview
    Owning the Virgin Media Hub 3.0: The perfect place for a backdoor
    No content preview
    Singularity of Origin
    No content preview
    Public Report – Confidential Space Security Review
    No content preview
    The Phishing Guide: Understanding & Preventing Phishing Attacks
    No content preview
    Testing HTTP/2 only web services
    No content preview
    Getting per-user Conditional Access MFA status in Azure
    No content preview
    McAfee Email and Web Security Appliance v5.6 – Any logged-in user can bypass controls to reset passwords of other administrators
    No content preview
    Mobile & web browser credential management: Security implications, attack cases & mitigations
    No content preview
    Forensic Fuzzing Tools
    No content preview
    iOS certificate pinning code updated for iOS 7
    No content preview
    Intel BIOS Advisory – Memory Corruption in HID Drivers
    No content preview
    HTTP Profiler
    No content preview
    Ghost Vulnerability (CVE-2015-0235)
    No content preview
    FrisbeeLite
    No content preview
    Some Musings on Common (eBPF) Linux Tracing Bugs
    No content preview
    iSEC Partners Releases SSLyze
    No content preview
    Intent Sniffer
    No content preview
    Heartbleed (CVE-2014-0160) Advisory
    No content preview
    Samba Andx Request Remote Code Execution
    No content preview
    Hackproofing MySQL
    No content preview
    Immunity Debugger Buffer Overflow
    No content preview
    Gizmo
    No content preview
    Fuzzing the Easy Way Using Zulu
    No content preview
    Overview of Modern Memory Security Concerns
    No content preview
    Project Bishop: Clustering Web Pages
    No content preview
    lapith
    No content preview
    Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding Internet RFCs (and how RFC Security might be Improved)
    No content preview
    Security Code Review With ChatGPT
    No content preview
    Fuzzing USB devices using Frisbee Lite
    No content preview
    Fuzzing the Easy Way Using Zulu (1)
    No content preview
    Public Report – Google Privacy Sandbox Aggregation Service and Coordinator
    No content preview
    Implementing and Detecting a PCI Rootkit
    No content preview
    Hiccupy
    No content preview
    Hacking a web application
    No content preview
    Package Play
    No content preview
    Public Report – IOV Labs powHSM Security Assessment
    No content preview
    Jackson Deserialization Vulnerabilities
    No content preview
    SAML Pummel
    No content preview
    Introspy for Android
    No content preview
    Hackproofing Oracle Application Server
    No content preview
    Flubot: the evolution of a notorious Android Banking Malware
    No content preview
    Public Report – Filecoin Bellman and BLS Signatures Cryptographic Review
    No content preview
    Interfaces.d to RCE
    No content preview
    Improving Your Embedded Linux Security Posture With Yocto
    No content preview
    Kubernetes Security: Consider Your Threat Model
    No content preview
    iSEC audit of MediaWiki
    No content preview
    How to protect yourself & your organisation from phishing attacks
    No content preview
    Ghidra nanoMIPS ISA module
    No content preview
    NCC Group co-signs the Electronic Frontier Foundation’s Statement on DMCA Use Against Security Researchers
    No content preview
    Readable Thrift (1)
    No content preview
    Inter-Protocol Communication
    No content preview
    Quantum Cryptography – A Study Into Present Technologies and Future Applications
    No content preview
    Premium Practical Law Content Gateway
    No content preview
    Introducing Azucar
    No content preview
    Impress Pages CMS Remote Code Execution
    No content preview
    Oracle Forensics Part 7 Using the Oracle System Change Number in Forensic Investigations
    No content preview
    Properly Signed Certificates on CPE Devices
    No content preview
    Public Report – Confidential Mode for Hyperdisk – DEK Protection Analysis
    No content preview
    iOS 7 arbitrary code execution in kernel mode
    No content preview
    Man-in-the-Middling Non-Proxy Aware Wi-Fi Devices with a Pineapple
    No content preview
    Oracle Passwords and OraBrute
    No content preview
    How much training should staff have on cyber security?
    No content preview
    Mobile apps and security by design
    No content preview
    Public Report – Dell Secured Component Verification
    No content preview
    Jailbreak, updated and open-sourced
    No content preview
    Flash security restrictions bypass: File upload by URLRequest
    No content preview
    IODIDE
    No content preview
    How to Spot and Prevent an Eclipse Attack
    No content preview
    HIDDEN COBRA Volgmer: A Technical Analysis
    No content preview
    Intel® Software Guard Extensions (SGX): A Researcher’s Primer
    No content preview
    hostresolver
    No content preview
    Reverse, Reveal, Recover: Windows Defender Quarantine Forensics
    No content preview
    Discovering Smart Contract Vulnerabilities with GOATCasino
    No content preview
    Conference Talks – February 2020
    No content preview
    Public Report – Electric Coin Company NU3 Specification and Blossom Implementation Audit
    No content preview
    Public Report - Security Risks of AI Hardware for Personal and Edge Computing Devices
    No content preview
    IG Learner Walkthrough
    No content preview
    Security Tips For Your AI Cloud Infrastructure
    No content preview
    ABSTRACT SHIMMER (CVE-2020-15257): Host Networking is root-Equivalent, Again
    No content preview
    Technical Advisory: Multiple Vulnerabilities in MailEnable
    No content preview
    When Security Gets in the Way: PenTesting Mobile Apps That Use Certificate Pinning
    No content preview
    Technical Advisory: Multiple Vulnerabilities in SmarterMail
    No content preview
    How I did not get a shell
    No content preview
    The economics of defensive security
    No content preview
    5G security – how to minimise the threats to a 5G network
    No content preview
    Denial of Service in Parsing a URL by ierutil.dll
    No content preview
    Medium Risk Vulnerability in Symantec Enterprise Security Management
    No content preview
    Defending Your Directory: An Expert Guide to Combating Kerberoasting in Active Directory
    No content preview
    Public Report – AWS Nitro System API & Security Claims French
    No content preview
    On the malicious use of large language models like GPT-3
    No content preview
    Medical Devices: A Hardware Security Perspective
    No content preview
    Technical Advisory: Multiple Vulnerabilities in Xerox Printers
    No content preview
    Hardware Security By Design: ESP32 Guidance
    No content preview
    Understanding and Hardening Linux Containers
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 3: Understanding Existing Approaches and Attempts
    No content preview
    Exposing Vulnerabilities in Media Software
    No content preview
    Tool Release: tcpprox
    No content preview
    Using Semgrep with Jupyter Notebook files
    No content preview
    Dangers of Kubernetes IAM Integrations
    No content preview
    CVE-2018-8611 Exploiting Windows KTM Part 5/5 – Vulnerability detection and a better read/write primitive
    No content preview
    Weak Randomness Part I – Linear Congruential Random Number Generators
    No content preview
    Webinar – PCI Version 3.0: Are you ready?
    No content preview
    Phish Supper: An Incident Responder’s Bread and Butter
    No content preview
    Assessing IIS Configuration Remotely
    No content preview
    44CON - Charging Ahead: Exploiting an EV Charger Controller at Pwn2Own Automotive 2024
    No content preview
    Machine Learning 102: Attacking Facial Authentication with Poisoned Data
    No content preview
    Vaccine Misinformation Part 1: Misinformation Attacks as a Cyber Kill Chain
    No content preview
    Technical Advisory: Code Execution by Viewing Resource Files in .NET Reflector
    No content preview
    Technical Advisory: Adobe ColdFusion WDDX Deserialization Gadgets
    No content preview
    Real World Cryptography Conference 2023 – Part II
    No content preview
    Puckungfu: A NETGEAR WAN Command Injection
    No content preview
    Sobelow Update
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 7: Development of Prototype #3 – Adventures in Anomaly Detection
    No content preview
    Technical Advisory – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)
    No content preview
    Whitepaper: CA Alternative
    No content preview
    Windows remote desktop memory corruptoin leading to RCE on XPSP3
    No content preview
    Technical Advisory: OS Command Injection in Silver Peak EdgeConnect Appliances (CVE-2020-12148, CVE-2020-12149)
    No content preview
    NCC Group’s 2021 Annual Research Report
    No content preview
    CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF) – Part 2
    No content preview
    Nameless and shameless: Ransomware Encryption via BitLocker
    No content preview
    The Importance of a Cryptographic Review
    No content preview
    Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs
    No content preview
    Car Parking Apps Vulnerable To Hacks
    No content preview
    Analyzing AI Application Threat Models
    No content preview
    Cryptopals: Exploiting CBC Padding Oracles
    No content preview
    Immortalising 20 Years of Epic Research
    No content preview
    Detecting Rclone – An Effective Tool for Exfiltration
    No content preview
    BlackHat USA 2024 - Listen-Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap
    No content preview
    Public Report – Penumbra Labs R1CS Implementation Review
    No content preview
    To dock or not to dock, that is the question: Using laptop docking stations as hardware-based attack platforms
    No content preview
    Why IoT Security Matters
    No content preview
    Exploring DeepFake Capabilities & Mitigation Strategies with University College London
    No content preview
    Technical Advisory – play-pac4j Authentication rule bypass
    No content preview
    Tool Release: Announcing the Release of RtspFuzzer
    No content preview
    Back in Black: Unlocking a LockBit 3.0 Ransomware Attack
    No content preview
    Analyzing a PJL directory traversal vulnerability – exploiting the Lexmark MC3224i printer (part 2)
    No content preview
    Oracle Forensics Part 2: Locating Dropped Objects
    No content preview
    Cracking Mifare Classic 1K: RFID, Charlie Cards, and Free Subway Rides
    No content preview
    Tool Release – Carnivore: Microsoft External Assessment Tool
    No content preview
    The Pharming Guide – Understanding and preventing DNS related attacks by phishers
    No content preview
    Weaknesses and Best Practices of Public Key Kerberos with Smart Cards
    No content preview
    Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 1: Understanding the Basics and What Platforms and Frameworks Are Available
    No content preview
    NCC Group WhitepaperUnderstanding and HardeningLinux ContainersJune 29, 2016 – Version 1.1
    No content preview
    iOS 7 tool updates
    No content preview
    Lights, Camera, HACKED! An insight into the world of popular IP Cameras
    No content preview
    Public Report – AWS Nitro System API & Security Claims German
    No content preview
    PRTG Network Monitor Command injection
    No content preview
    Understanding Microsoft Word OLE Exploit Primitives
    No content preview
    Technical Advisory – Lansweeper Privilege Escalation via CSRF Using HTTP Method Interchange (CVE-2020-13658)
    No content preview
    Technical Advisory: Multiple Vulnerabilities in ManageEngine Desktop Central
    No content preview
    Shining New Light on an Old ROM Vulnerability: Secure Boot Bypass via DCD and CSF Tampering on NXP i.MX Devices
    No content preview
    Public Report – RustCrypto AES/GCM and ChaCha20+Poly1305 Implementation Review
    No content preview
    Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities
    No content preview
    OCP S.A.F.E. How-to
    No content preview
    NCC Group Connected Health Whitepaper July 2019
    No content preview
    Deception Engineering: exploring the use of Windows Service Canaries against ransomware
    No content preview
    An offensive guide to the Authorization Code grant
    Discover NCC Group’s offensive security perspective on Authorization Code Grant vulnerabilities and mitigations.  ( 14 min )
    RSA Conference – Mobile Threat War Room
    No content preview  ( 6 min )
    Research Insights Volume 7: Exploitation Advancements
    No content preview  ( 7 min )
    Which database is more secure? Oracle vs. Microsoft
    No content preview  ( 7 min )
    Stepping Stones – A Red Team Activity Hub
    No content preview  ( 9 min )
    NCC Group Malware Technical Note
    No content preview  ( 6 min )
    Black Hat 2013 – Femtocell Presentation Slides, Videos and App
    Explore NCC Group’s femtocell attack research presented at Black Hat 2013, including downloadable resources.  ( 8 min )
    White Paper: Browser Extension Password Managers
    No content preview  ( 7 min )
    Technical Advisory – Apple XAR – Arbitrary File Write (CVE-2021-30833)
    No content preview  ( 8 min )
    Hunting SQL Injection Bugs
    No content preview  ( 6 min )
    Integrity destroying malicious code for financial or geopolitical gain: A vision of the future?
    No content preview  ( 7 min )
    A few notes on usefully exploiting libstagefright on Android 5.x
    No content preview  ( 8 min )
    Understanding Ransomware: Impact, Evolution and Defensive Strategies
    No content preview  ( 7 min )
    LeaPFRogging PFR Implementations
    Explore NCC Group’s insights on leapfrogging PFR implementations to improve security and streamline processes.  ( 12 min )
    An Illustrated Guide to Elliptic Curve Cryptography Validation
    No content preview  ( 16 min )
    EasyDA – Easy Windows Domain Access Script
    No content preview
    Decoder Improved Burp Suite Plugin
    No content preview
    Conference Talks – September 2021
    No content preview
    Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE-2015-0057) bug on both 32-bit and 64-bit
    No content preview
    Emissary Panda – A potential new malicious tool
    No content preview
    Dissecting social engineering attacks
    No content preview
    Derusbi: A Case Study in Rapid Capability Development
    No content preview
    CVE-2019-1405 and CVE-2019-1322 – Elevation to SYSTEM via the UPnP Device Host Service and the Update Orchestrator Service
    No content preview
    Combating Java Deserialisation Vulnerabilities with Look-Ahead Object Input Streams (LAOIS)
    No content preview
    Erlang Security 101
    No content preview
    Double-odd Elliptic Curves
    No content preview
    Distributed Ledger (Blockchain) Security and Quantum Computing Implications
    No content preview
    Decoding network data from a Gh0st RAT variant
    No content preview
    Database Security Brief: The Oracle Critical Patch Update for April 2007
    No content preview
    Firmware Rootkits: The Threat to the Enterprise
    No content preview
    Exploiting CVE-2014-0282 (1)
    No content preview
    Encryption Does Not Equal Invisibility – Detecting Anomalous TLS Certificates with the Half-Space-Trees Algorithm
    No content preview
    Deep Dive into Real-World Kubernetes Threats
    No content preview
    Chafer backdoor analysis
    No content preview
    Ethics in Security Testing
    No content preview
    Enumerating System Management Interrupts
    No content preview
    Don’t throw a hissy fit; defend against Medusa
    No content preview
    DNS Pinning and Web Proxies
    No content preview
    Detecting Karakurt – an extortion focused threat actor
    No content preview
    Decrypting OpenSSH sessions for fun and profit
    No content preview
    eBook – Planning a robust incident response process
    No content preview
    Disclosure Policy
    No content preview
    D0nut encrypt me, I have a wife and no backups
    No content preview
    Cyber red-teaming business-critical systems while managing operational risk
    No content preview
    Common Flaws of Distributed Identity and Authentication Systems
    No content preview
    Exploring Overfitting Risks in Large Language Models
    No content preview
    easyda
    No content preview
    dotnetpefuzzing
    No content preview
    Does TypeScript Offer Security Improvements Over JavaScript?
    No content preview
    Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
    No content preview
    Endpoint connectivity
    No content preview
    Encryption at rest: Not the panacea to data protection
    No content preview
    Dynamic Linq Injection Remote Code Execution Vulnerability (CVE-2023-32571)
    No content preview
    Detection Engineering for Kubernetes clusters
    No content preview
    Critical Risk Vulnerability in Ingres (Pointer Overwrite 1)
    No content preview
    Content Security Policies and Popular CMS Systems
    No content preview
    External Enumeration and Exploitation of Email and Web Security Solutions
    No content preview
    Elephant in the Boardroom Survey 2016
    No content preview
    DIBF – Updated
    No content preview
    DeLux Edition: Getting root privileges on the eLux Thin Client OS
    No content preview
    Early CCS Attack Analysis
    No content preview
    Domestic IoT Nightmares: Smart Doorbells
    No content preview
    Database Servers on Windows XP and the unintended consequences of simple file sharing
    No content preview
    Five Essential Machine Learning Security Papers
    No content preview
    Microsoft Office Memory Corruption Vulnerability
    No content preview
    firstexecution
    No content preview
    File Fuzzers
    No content preview
    Faster Modular Inversion and Legendre Symbol, and an X25519 Speed Record
    No content preview
    Finding the weak link in binaries
    No content preview
    Exporting non-exportable RSA keys
    No content preview
    Exploiting Security Gateways Via Web Interfaces
    No content preview
    Exploiting CVE-2014-0282
    No content preview
    Extractor
    No content preview
    Exploiting Noisy Oracles with Bayesian Inference
    No content preview
    Exploit the Fuzz – Exploiting Vulnerabilities in 5G Core Networks
    No content preview
    Extending a Thinkst Canary to become an interactive honeypot
    No content preview
    Exploiting Samba CVE-2015-0240 on Ubuntu 12.04 and Debian 7 32-bit
    No content preview
    Exploiting Rich Content
    No content preview
    Exploiting PL/SQL Injection Flaws with only CREATE SESSION Privileges
    No content preview
    Exception Handling and Data Integrity in Salesforce
    No content preview
    Enterprise-scale seamless onboarding and deployment of Azure Sentinel using Lighthouse for multi-tenant environments
    No content preview
    Fat-Finger
    No content preview
    Extracting the Payload from a CVE-2014-1761 RTF Document
    No content preview
    Exploring Verifiable Random Functions in Code
    No content preview
    Estimating the Bit Security of Pairing-Friendly Curves
    No content preview
    EDIDFuzzer
    No content preview
    Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
    No content preview
    Exploring Prompt Injection Attacks
    No content preview
    Exploring macOS Calendar Alerts: Part 2 – Exfiltrating data (CVE-2020-3882)
    No content preview
    Exploring macOS Calendar Alerts: Part 1 – Attempting to execute code
    No content preview
    Exploit mitigations: keeping up with evolving and complex software/hardware
    No content preview
    Experiments in Extending Thinkst Canary – Part 1
    No content preview
    EternalGlue part one: Rebuilding NotPetya to assess real-world resilience
    No content preview
    LAPSUS$: Recent techniques, tactics and procedures
    No content preview
    Technical Advisory – SerComm h500s – Authenticated Remote Command Execution (CVE-2021-44080)
    No content preview
    Public Report – Threshold ECDSA Cryptography Review
    No content preview
    The Password is Dead, Long Live the Password!
    No content preview
    Latest threats to the connected car & intelligent transport ecosystem
    No content preview
    An adventure in PoEKmon NeutriGo land
    No content preview
    Pumping Iron on the Musl Heap – Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap
    No content preview
    Working with the Open Technology Fund
    No content preview
    Incremental Machine Learning by Example: Detecting Suspicious Activity with Zeek Data Streams, River, and JA3 Hashes
    No content preview
    An Introduction to Fault Injection (Part 1/3)
    No content preview
    An Analysis of Mobile Geofencing App Security
    No content preview
    Impact of DNS over HTTPS (DoH) on DNS Rebinding Attacks
    No content preview
    NCC Group’s 2020 Annual Research Report
    No content preview
    Drones: Detect, Identify, Intercept, and Hijack
    No content preview
    Technical Advisory – Ollama DNS Rebinding Attack (CVE-2024-28224)
    No content preview
    Tool Release – Reliably-checked String Library Binding
    No content preview
    Launching the first in our series of Research Insights
    No content preview
    Practical Considerations of Right-to-Repair Legislation
    No content preview  ( 17 min )
    A Look At Some Real-World Obfuscation Techniques
    No content preview  ( 17 min )
    Finding and Exploiting .NET Remoting over HTTP using Deserialisation
    No content preview  ( 12 min )
    Technical Advisory – Multiple Vulnerabilities in Connectize G6 AC2100 Dual Band Gigabit WiFi Router (CVE-2023-24046, CVE-2023-24047, CVE-2023-24048, CVE-2023-24049, CVE-2023-24050, CVE-2023-24051, CVE-2023-24052)
    No content preview  ( 20 min )
    Fake CAPTCHA led to LUMMA
    Discover the social engineering behind fake CAPTCHA attacks. Learn how Lumma malware infects systems and what defenses can stop it.  ( 9 min )
    Spectre and Meltdown: What you Need to Know
    No content preview  ( 12 min )
    Mitigating the top 10 security threats to GCP using the CIS Google Cloud Platform Foundation Benchmark
    No content preview  ( 12 min )
    Technical Advisory – libraptor – XXE in RDF/XML File Interpretation
    A technical breakdown of the XXE vulnerability in libraptor’s RDF/XML interpretation and its impact on downstream applications.  ( 10 min )
    Technical Advisory – Hash Denial-of-Service Attack in Multiple QUIC Implementations
    No content preview  ( 14 min )
    Whitepaper: Perfect Forward Security
    No content preview  ( 7 min )
    RIFT: Analysing a Lazarus Shellcode Execution Method
    No content preview  ( 9 min )
    CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF) – Part 1
    No content preview  ( 32 min )
    Stepping Insyde System Management Mode
    No content preview  ( 17 min )
    Metastealer – filling the Racoon void
    No content preview  ( 10 min )
    A WarCon 2017 Presentation: Cisco ASA – Exploiting the IKEv1 Heap Overflow – CVE-2016-1287
    No content preview  ( 7 min )
    Understanding the root cause of F5 Networks K52145254: TMUI RCE vulnerability CVE-2020-5902
    No content preview  ( 10 min )
    Detecting and Hunting for the PetitPotam NTLM Relay Attack
    No content preview  ( 9 min )
    Technical Advisory – Multiple Vulnerabilities in Faronics Insight (CVE-2023-28344, CVE-2023-28345, CVE-2023-28346, CVE-2023-28347, CVE-2023-28348, CVE-2023-28349, CVE-2023-28350, CVE-2023-28351, CVE-2023-28352, CVE-2023-28353)
    No content preview  ( 24 min )
    Rustproofing Linux (Part 2/4 Race Conditions)
    No content preview  ( 14 min )
    Vulnerability Overview: Ghost (CVE-2015-0235)
    No content preview  ( 9 min )
    So long and thanks for all the 0day
    No content preview  ( 21 min )
    Detecting Mimikatz with Busylight
    No content preview  ( 10 min )
    Technical Advisory – OpenJDK – Weak Parsing Logic in java.net.InetAddress and Related Classes
    No content preview  ( 17 min )
    A Primer On Slowable Encoders
    No content preview  ( 12 min )
    Technical Advisory – Multiple Vulnerabilities in the Galaxy App Store (CVE-2023-21433, CVE-2023-21434)
    No content preview  ( 10 min )
    Technical Advisory – SonicWall SMA 100 Series – Multiple Unauthenticated Heap-based and Stack-based Buffer Overflow (CVE-2021-20045)
    No content preview  ( 9 min )
    How To Spot a Penetration Tester in Your Network (and Catch the Real Bad Guys at the Same Time)
    This guide reveals techniques to detect penetration testers and uncover genuine threats during security assessments.  ( 13 min )
    Technical Advisory – U-Boot – Unchecked Download Size and Direction in USB DFU (CVE-2022-2347)
    No content preview  ( 10 min )
    Helping Engineering Teams Tackle Security Debt in Embedded Systems: U-Boot Configuration Auditing Introduced in Depthcharge v0.2.0
    No content preview  ( 14 min )
    Public Report – Zendoo Proof Verifier Cryptography Review
    No content preview  ( 7 min )
    Announcing the Cryptopals Guided Tour Video 18: Implement CTR
    No content preview  ( 8 min )
    StreamDivert: Relaying (specific) network connections
    No content preview  ( 9 min )
    Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
    No content preview  ( 25 min )
    Exploring the Security & Privacy of Canada’s Digital Proof of Vaccination Programs
    Understand the security challenges and privacy concerns of Canada’s digital vaccination systems and how to mitigate potential threats.  ( 30 min )
    Matty McMattface: Security implications, mitigations & testing strategies for biometric facial recognition systems
    No content preview  ( 7 min )
    Symantec Messaging Gateway Arbitrary file download is possible with a crafted URL (authenticated)
    Learn how a crafted URL can exploit Symantec Messaging Gateway for arbitrary file downloads and how to mitigate this risk.  ( 7 min )
    Self-Driving Cars- The future is now…
    No content preview  ( 7 min )
    Secure Coding in C and C++, 2nd Edition
    No content preview  ( 6 min )
    Xen HYPERVISOR_xen_version stack memory revelation
    No content preview  ( 6 min )
    Adobe Flash Player Cross Domain Policy Bypass
    No content preview  ( 6 min )
    Ricochet Security Assessment Public Report
    No content preview  ( 6 min )
    HTML5 Security The Modern Web Browser Perspective
    No content preview  ( 6 min )
    Insomnihack - Pioneering Zero Days at Pwn2Own Automotive 2024
    No content preview  ( 7 min )
    Sniffle: A Sniffer for Bluetooth 5
    No content preview  ( 7 min )
    Threat Profiling Microsoft SQL Server
    No content preview  ( 6 min )
    NCC CON Europe 2017
    No content preview  ( 7 min )
    Auditing Enterprise Class Applications and Secure Containers on Android
    No content preview  ( 6 min )
    Technical Advisory: Shell Injection in MacVim mvim URI Handler
    No content preview  ( 7 min )
    Windows DACLs & Why There Is Still Room for Interest
    No content preview  ( 8 min )
    OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel
    No content preview  ( 7 min )
    A Rendezvous with System Management Interrupts
    No content preview  ( 9 min )
    Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability
    No content preview  ( 7 min )
    Technical Advisory: Condeon CMS
    No content preview  ( 8 min )
    Where You Inject Matters: The Role-Specific Impact of Prompt Injection Attacks on OpenAI models
    No content preview  ( 8 min )
    Public Report – Zcash NU5 Cryptography Review
    No content preview  ( 7 min )
    Non-flood/non-volumetric Distributed Denial of Service (DDoS)
    No content preview  ( 7 min )
    Oracle Retail Invoice Manager SQL Injection
    No content preview  ( 6 min )
    McAfee Email and Web Security Appliance Reflective XSS allowing an attacker to gain session tokens
    No content preview  ( 6 min )
    Symantec Messaging Gateway – Out of band stored XSS via email
    No content preview  ( 6 min )
    IETF Draft: Indicators of Compromise and Their Role in Attack and Defen[c|s]e
    No content preview  ( 7 min )
    Symantec Backup Exec 2012 – Persistent XSS Vulnerability Affecting Custom Reports
    No content preview  ( 7 min )
    Passive Information Gathering – The Analysis of Leaked Network Security Information
    No content preview  ( 7 min )
    Whitepaper – Exploring the Security of KaiOS Mobile Applications
    No content preview  ( 7 min )
    Tool Release: Blackbox Android App Analysis with Introspy
    No content preview  ( 7 min )
    Technical Advisory: Command Injection
    No content preview  ( 7 min )
    How organisations can properly configure SSL services to ensure the integrity and confidentiality of data in transit
    No content preview  ( 7 min )
    Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
    No content preview  ( 6 min )
    White Paper: Login Service Security
    No content preview  ( 7 min )
    Medium Risk Vulnerability in Symantec Network Access Control
    No content preview  ( 6 min )
    Windows Remote Desktop Memory Corruption Leading to RCE on XPSP3
    No content preview  ( 8 min )
    Kivlad
    No content preview  ( 7 min )
    Introducing idb-Simplified Blackbox iOS App Pentesting
    No content preview  ( 6 min )
    Public Report – Entropy/Rust Cryptography Review
    No content preview  ( 7 min )
    port-scan-automation
    No content preview  ( 7 min )
    Chrome Password Manager Cross Origin Weakness
    Explore how a cross-origin flaw in Chrome’s password manager could allow attackers to steal credentials via embedded content.  ( 8 min )
    Symantec Messaging Gateway – Unauthorised SSH access
    No content preview  ( 6 min )
    Harnessing GPUs Building Better Browser Based Botnets
    No content preview  ( 6 min )
    iOS Instrumentation Without Jailbreak
    No content preview
    How will GDPR impact your communications?
    No content preview
    Public Report – Coda Cryptographic Review
    No content preview
    Jailbreak
    No content preview
    Going “AUTH the Rails” on a Crazy Train
    No content preview
    An Introduction to Heap overflows on AIX 5.3L
    No content preview  ( 6 min )
    Heartbleed OpenSSL vulnerability
    Learn the impact of Heartbleed on OpenSSL and how NCC Group helps secure systems against this critical flaw.  ( 9 min )
    Analysis of the Linux backdoor used in freenode IRC network compromise
    No content preview  ( 12 min )
    Lessons learned from 50 bugs: Common USB driver vulnerabilities
    No content preview  ( 7 min )
    Adventures in Windows Driver Development: Part 1
    Dive into the fundamentals of Windows driver development with NCC Group’s hands-on exploration of kernel-mode programming.  ( 13 min )
    Announcing the AWS blog post series
    No content preview
    Android SSL Bypass
    No content preview
    Analysis of Boomerang Differential Trials via a SAT-Based Constraint Solver URSA
    No content preview
    An Introduction to Ultrasound Security Research
    No content preview
    EAP-TLS: The most secure option?
    No content preview
    Research Paper – Machine Learning for Static Malware Analysis, with University College London
    No content preview
    Public Report – Electric Coin Company NU4 Cryptographic Specification and Implementation Review
    No content preview
    Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
    No content preview
    Conference Talks – February/March 2021
    No content preview
    Pairing over BLS12-381, Part 1: Fields
    No content preview
    SMACK, SKIP-TLS & FREAK SSL/TLS Vulnerabilities
    Discover how these SSL/TLS flaws allow attackers to bypass encryption, impersonate servers, and intercept sensitive data.  ( 10 min )
    Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks
    No content preview  ( 10 min )
    SCOMplicated? – Decrypting SCOM “RunAs” credentials
    No content preview  ( 10 min )
    Secure Device Manufacturing: Supply Chain Security Resilience
    No content preview  ( 7 min )
    Readable Thrift
    No content preview  ( 10 min )
    On the Use of Pedersen Commitments for Confidential Payments
    No content preview  ( 12 min )
    Shellshock Bash Vulnerability
    No content preview  ( 8 min )
    Writing Robust Yara Detection Rules for Heartbleed
    Explore NCC Group’s approach to writing effective YARA rules for detecting Heartbleed in OpenSSL implementations.  ( 11 min )
    Pairing over BLS12-381, Part 2: Curves
    A technical look at the curve foundations of BLS12-381 and their importance in pairing-based cryptography.  ( 15 min )
    SAML XML Injection
    No content preview  ( 14 min )
    TA505: A Brief History Of Their Time
    No content preview  ( 14 min )
    NCC Group researchers named amongst MSRC’s Most Valuable Security Researchers in 2020
    No content preview  ( 8 min )
    Technical Advisory – Authorization Bypass Allows for Pinboard Corruption
    Explore how a flaw in access control could allow unauthorized users to corrupt Pinboard data and compromise integrity.  ( 8 min )
    Secure Messaging for Normal People
    No content preview  ( 7 min )
    Oracle Forensics Part 4: Live Response
    No content preview  ( 7 min )
    Pointer Sequence Reverser (PSR)
    No content preview  ( 7 min )
    TANDBERG Video Communication Server Arbitrary File Retrieval
    No content preview  ( 7 min )
    PeachFarmer
    No content preview  ( 7 min )
    Pip3line
    No content preview  ( 6 min )
    Research Report – Zephyr and MCUboot Security Assessment
    No content preview  ( 8 min )
    PDF Form Filling and Flattening Tool Buffer Overflow
    Explore how a buffer overflow vulnerability in a PDF form filling and flattening tool could lead to memory corruption and security risks.  ( 8 min )
    Symantec Backup Exec 2012 – OS version and service pack information leak
    No content preview  ( 7 min )
    Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond
    No content preview  ( 7 min )
    Security Best Practice: Host Naming & URL Conventions
    No content preview  ( 7 min )
    Technical Advisory – FreePBX – Multiple Authenticated SQL Injections in UCP application
    No content preview  ( 8 min )
    Technical Advisory – Arbitrary File Read in Dell Wyse Management Suite (CVE-2021-21586, CVE-2021-21587)
    No content preview  ( 8 min )
    State-of-the-art email risk
    No content preview  ( 7 min )
    Maritime Cyber Security: Threats and Opportunities
    No content preview  ( 6 min )
    Setting a New Standard for Kubernetes Deployments
    No content preview  ( 9 min )
    SSL checklist for pentesters
    No content preview  ( 6 min )
    Ransomware: what organisations can do to survive
    No content preview  ( 6 min )
    Memory Scanning for the Masses
    No content preview  ( 9 min )
    RtspFuzzer
    No content preview  ( 6 min )
    OSX afpserver remote code execution
    No content preview  ( 6 min )
    Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism
    No content preview  ( 7 min )
    Secure Device Provisioning Best Practices: Heavy Truck Edition
    No content preview  ( 7 min )
    Technical Advisory – Apple iOS / OSX: Foundation NSXMLParser XXE Vulnerability
    Explore how a flaw in Apple’s NSXMLParser could allow XML External Entity (XXE) attacks on iOS and macOS systems.  ( 9 min )
    scenester
    No content preview  ( 6 min )
    Technical Advisory – ARM MbedOS USB Mass Storage Driver Memory Corruption
    No content preview  ( 10 min )
    SharkBot: a “new” generation Android banking Trojan being distributed on Google Play Store
    No content preview  ( 14 min )
    Second-Order Code Injection Attacks
    No content preview  ( 6 min )
    Symantec Messaging Gateway – Unauthenticated detailed version disclosure
    No content preview  ( 6 min )
    Oracle Hyperion 11 Directory Traversal
    No content preview  ( 7 min )
    Perfect Forward Security
    No content preview  ( 6 min )
    McAfee Email and Web Security Appliance Session hijacking and bypassing client-side session timeouts
    No content preview  ( 6 min )
    Return of the hidden number problem
    No content preview  ( 7 min )
    Technical Advisory – Coda Filesystem Kernel Memory Disclosure
    This technical advisory details a kernel memory disclosure issue in the Coda filesystem and its potential impact.  ( 9 min )
    Technical Advisory – Sunhillo SureLine Unauthenticated OS Command Injection (CVE-2021-36380)
    No content preview  ( 8 min )
    Poison Ivy string decryption
    Explore how NCC Group reverse-engineers Poison Ivy’s string obfuscation to uncover hidden commands and payloads.  ( 8 min )
    Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing
    No content preview  ( 7 min )
    Technical Advisory – Garuda Linux Insecure User Creation (CVE-2021-3784)
    No content preview  ( 8 min )
    Technical Advisory – SonicWall SMA 100 Series – Heap-Based Buffer Overflow (CVE-2021-20043)
    No content preview  ( 8 min )
    Story of a Hundred Vulnerable Jenkins Plugins
    Explore the security risks in Jenkins plugins, how vulnerabilities were found, and steps to strengthen CI/CD security.  ( 14 min )

  • Open

    Technical Advisory: Tesla Telematics Control Unit - ADB Auth Bypass
    Technical Advisory: Tesla Telematics Control Unit - ADB Auth Bypass  ( 12 min )

  • Open

    Public Report: Meta Whatsapp message summarization service
    No content preview  ( 7 min )

  • Open

    Adventures in EM Side-channel Attacks
    Adventures in EM Side-channel Attacks Eucleak  ( 7 min )

  • Open

    TANDBERG Video Communication Server Static SSH Host KeysN
    Explore how hardcoded SSH host keys in Tandberg Video Communication Server could expose systems to impersonation and MITM attacks.  ( 9 min )

  • Open

    Crack the Riddle, Secure the Oasis: Core NetWars Version 11 is Here
    A blog about SANS Institute's new Core NetWars Version 11  ( 12 min )

  • Open

    Expanding on ChunkyIngress - Clippy Goes Rogue (GoClipC2)
    GoClipC2: A covert Windows clipboard-based C2 channel for VDI/RDP environments. Bypasses network monitoring with encrypted Base64 messaging.  ( 10 min )
    Expanding on ChunkyIngress - Clippy Goes Rogue (GoClipC2)
    GoClipC2: A covert Windows clipboard-based C2 channel for VDI/RDP environments. Bypasses network monitoring with encrypted Base64 messaging.  ( 10 min )

  • Open

    The Cost Savings of Fixing Security Flaws in Development
    No content preview  ( 7 min )

  • Open

    A New Approach to Proving Cybersecurity Value (That Isn’t ROI)
    In this blog, we are excited to announce our white paper on Return on Mitigation (RoM), a framework we designed to quantify the financial impact of security programs in a way that speaks to business leaders.  ( 6 min )
    Celebrating 10 Years of Partnership: Snap and HackerOne Reach $1M in Bounties
    At Snap, security is more than a priority—it’s a core mission. Over the past decade, Snap has partnered with HackerOne to build and sustain a robust bug bounty program. This collaboration has led to major milestones, including paying security researchers over $1M in bounties. To celebrate this achievement and their 10-year partnership, we spoke with Jim Higgins, Snap's Chief Information Security Officer, Vinay Prabhushankar, Snap’s Security Engineering Manager, and Ilana Arbisser, Snap’s Privacy Engineer.

  • Open

    Women@ Kicks Off the Year with a Vision Board Event
    No content preview  ( 4 min )

  • Open

    Gain Actionable, Data-backed Insights with HackerOne Recommendations
    What if your security program could self-optimize: analyze trends, identify weak points, and proactively propose actionable steps to strengthen defenses? With HackerOne Recommendations, it can.  ( 5 min )

  • Open

    Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery
    What are Hackbots and how are they impacting vulnerability discovery and the researcher community?  ( 6 min )

  • Open

    DORA Compliance Is Here: What Financial Entities Should Know
    The new DORA regulation: everything your organization needs to know about its impact and how to comply.  ( 5 min )

  • Open

    Protecting Critical Infrastructure: A Tale of Two National Cybersecurity Strategies
    The term “special relationship,” coined by Winston Churchill, describes the close, longstanding alliance between the United States and the United Kingdom. It has been applied to cooperation during war, to trade and commerce, and even to intelligence sharing. That special relationship has clearly influenced the two nations’ recent policy papers on national cybersecurity. The U.K. […] The post Protecting Critical Infrastructure: A Tale of Two National Cybersecurity Strategies appeared first on Synack.  ( 7 min )

  • Open

    Scoping Adventures: How to Get the Most Out of Your Synack Pentesting
    Scoping Adventures is a series of blogs about some of the more interesting penetration tests that the Synack Customer Success teams have worked on over the last few months. Each blog outlines how we engage with the client to achieve the best results from a pentest. Pentesters love colors—red, blue, purple, black, white and grey […] The post Scoping Adventures: How to Get the Most Out of Your Synack Pentesting appeared first on Synack.  ( 11 min )

  • Open

    Applying Strategic Thinking in Your Pentesting Program
    The Synack Platform & Five Pillars of Strategic Pentesting Why You Need to Think Strategically It’s no great revelation that tactics, techniques, and procedures utilized by nefarious hackers hacking activities are evolving on a daily basis. In 2022, 18,828 common vulnerabilities and exposures (CVEs) were published. At the same time, organization attack surfaces are expanding. […] The post Applying Strategic Thinking in Your Pentesting Program appeared first on Synack.  ( 7 min )

  • Open

    The U.S. has a new cybersecurity strategy. What’s next for CISOs?
    One week ago, the Biden administration unveiled its long-awaited U.S. National Cybersecurity Strategy, with an eye toward centralizing government cyber resources and holding IT vendors more accountable for their digital defenses. Now that the ink is dry on the 35-page document, top officials like Acting National Cyber Director Kemba Walden are busy putting it into […] The post The U.S. has a new cybersecurity strategy. What’s next for CISOs? appeared first on Synack.  ( 7 min )
2026-05-05T01:55:08.594Z osmosfeed 1.15.1