Skip to navigation
Skip to main content
Skip to footer
NCC Group
Menu
Services
Open sub menu for Services
Incident Response
Incident Response
Incident Readiness
Cyber Incident Response Management
Incident Response Recovery
Technical Assurance
Technical Assurance
Penetration Testing Services
Application Security
Hardware & Embedded Services
Network Infrastructure, Architecture & Container Security
Attack Simulation
Cryptography & Encryption
Cloud Security Services
Cyber Services Portal
Managed Services
Managed Services
Managed Extended Detection & Response (MXDR)
Managed Extended Detection & Response (MXDR)
Managed XDR for Microsoft
Managed XDR for Splunk
Vulnerability Scanning & Management
Bug Bounty & Vulnerability Disclosure Services
External Attack Surface Management
Unified Cyber Platform
Consulting & Implementation
Consulting & Implementation
Identity & Access Management
Operational Technology
People: Training & Awareness
Strategy, Risk & Compliance
Project & Program Management
Threat Intelligence
Threat Intelligence
Online Exposure Monitoring
Escode
Escode
Software Escrow
SaaS Escrow
Escrow Agreements
Escrow Verifications
Sectors
Open sub menu for Sectors
Financial Services Sector
Legal & Professional Services
Retail & Consumer Markets
Public Sector & Government Services
Transport Services
Technology, Media & Telecommunications Services
Energy & Utilities Services
Manufacturing Services
Health Services
Resources
Open sub menu for Resources
Resource Hub
Cyber Threat Intelligence Reports
Newsroom
Global Cyber Policy Radar
Research Blog
About Us
Open sub menu for About Us
What we do at a glance
Office Locations
Sustainability
Investor Relations
Careers
Search
US
Open sub menu for regions
United States
United Kingdom
Singapore
Australia
Netherlands
English
Belgium
English
Spain
Client login
Open sub menu for Customer Portals
Managed Services Unified Cyber Platform (UCP)
Cyber Services Portal
Managed Scanning Customer Portal
Escrow View
Signify IMC Portal
Escrow Connect
Enter a search term
Research Blog
Insights and research from our global cybersecurity team.
Public Reports
Download our 2024 Annual Research Report
Download
Toggle filters
Filter content
Resource type
Blog Posts (1)
Research (1287)
Whitepapers (2)
Topic
5G Security & Smart Environments (10)
Academic Partnership (3)
Annual Research Report (4)
Asia Pacific Research (1)
Awards & Recognition (4)
Blockchain (5)
Books (17)
Business Insights (6)
Cloud & Containerization (35)
Cloud Security (19)
Conferences (39)
Corporate (7)
Cryptography (122)
CTFs/Microcorruption (1)
Current events (1)
Cyber as a Science (6)
Cyber Security (405)
Detection and Threat Hunting (16)
Digital Forensics and Incident Response (DFIR) (29)
Disclosure Policy (1)
Emerging Technologies (12)
Engineering (5)
Fox-IT (18)
Fox-IT and European Research (8)
Gaming & Media (10)
Hardware & Embedded Systems (109)
Intern Projects (2)
iSec Partners (52)
Machine Learning (34)
Managed Detection & Response (22)
Misinformation, Deepfakes, & Synthetic Media (2)
North American Research (28)
Offensive Security & Artificial Intelligence (19)
Patch notifications (35)
Presentations (56)
protocol_name (1)
Public interest technology (12)
Public Reports (58)
Public tools (106)
Reducing Vulnerabilities at Scale (22)
Research (373)
Research Paper (21)
Resources (2)
Reverse Engineering (50)
Risk Management & Governance (6)
Standards (13)
Technical advisories (221)
Technology Policy (1)
Threat briefs (3)
Threat Intelligence (70)
Tool Release (113)
Transport (16)
Tutorial/Study Guide (49)
UK Research (10)
Uncategorized (28)
Virtualization, Emulation, & Containerization (10)
VSR (32)
Vulnerability (170)
Vulnerability Research (9)
Whitepapers (238)
Author
Aaron Adams (13)
Aaron Greetham (1)
Aaron Haymore (61)
Adam Roberts (1)
Alberto Verza (1)
Aleksandar Kircanski (2)
Alessandro Fanio Gonzalez (1)
Alex Plaskett (16)
Alex Zaviyalov (1)
Alexander Smye (1)
Alvaro Martin Fraguas (1)
Andrea Shirley-Bellande (1)
Andrew Wade (1)
Andy Davis (10)
Andy Grant (3)
Anthony Ferrillo (1)
Antonis Terefos (1)
aschmitz (1)
Austin Peavy (1)
Ava Howell (1)
balazs.bucsay (7)
Ben Lister (1)
Bill Marquette (1)
Caleb Watt (1)
Carles Pey (2)
Catalin Visinescu (5)
Cedric Halbronn (8)
Chris Nevin (1)
chrisanley (4)
Christian Powills (13)
christopherjamesbury (1)
Clayton Lowell (1)
cnevncc (1)
Corey Arthur (1)
Craig Blackie (2)
Dan Hastings (4)
Daniel Romero (2)
Daniele Costa (1)
Dave G. (1)
David Cash (5)
David Young (1)
destoken (1)
Diana Dragusin (2)
Diego Gómez Marañon (2)
Domen Puncer Kugler (5)
Drew Wade (1)
Elena Bakos Lang (4)
Eli Sohl (7)
Eric Schorn (13)
Erik Schamper (3)
Erik Steringer (2)
Eva Esteban Molina (1)
Exploit Development Group (1)
Fernando Gallego (2)
Frank Gifford (1)
Gérald Doussot (6)
Giacomo Pope (4)
Global Threat Intelligence (8)
Iain Smart (1)
Ilya Zhuravlev (1)
Jack Leadford (1)
James Chambers (5)
Jameson Hyde (3)
Jason Kielpinski (1)
Jay Houppermans (1)
Jeff Dileo (10)
Jelle Vergeer (3)
Jennifer Fernick (73)
Jennifer Reed (1)
Jeremy Boone (1)
Jerome Smith (6)
Jesus Calderon Marin (1)
Jesús Calderón Marín (1)
John Redford (1)
Jon Szymaniak (5)
Joost Jansen (1)
Jose Selvi (9)
Joshua Dow (1)
Joshua Kamp (1)
Joshua Makinen (1)
Ken Gannon (2)
Ken Wolstencroft (1)
Kevin Henry (4)
Lauren Eynon (1)
Liam Glanfield (1)
Liam Stevenson (3)
Liew hock lai (1)
Liyun Li (3)
Luis Toro Puig (2)
Luke Paris (1)
Manuel Gines (3)
Margit Hazenbroek (2)
Marie-Sarah Lacharite (3)
Mario Rivas (2)
Mark Manning (2)
Mark Tedman (6)
Matt Lewis (101)
Matthew Pettitt (1)
Max Groot (1)
McCaulay Hudson (8)
Michael Gough (5)
Mick Koomen (1)
Mostafa Hassan (2)
NCC Group (15)
NCC Group & Fox-IT Data Science Team (1)
NCC Group Publication Archive (535)
nccdavid (4)
nccricardomr (1)
Neil Bergman (2)
Nick Dunn (1)
Nick Galloway (1)
Nicolas Bidron (4)
Nicolas Guigo (1)
Nikolaos Pantazopoulos (5)
Oliver Brooks (3)
Ollie Whitehouse (28)
Parnian Alimi (3)
Paul Bottinelli (10)
Peter Scopes (1)
philipmarsdennccgroupcom (2)
Philipp Schaefer (1)
qkchambers (1)
R.Rivera (10)
Rafael Alfaro March (6)
Rami McCarthy (3)
Ray Lai (1)
Rennie deGraaf (2)
Rich Warren (20)
Richard Appleby (3)
Rick Veldhoven (1)
RIFT: Research and Intelligence Fusion Team (26)
Rindert Kramer (1)
Rob Wood (7)
Robert C. Seacord (6)
Robert Herrera (1)
Robert Wessen (15)
Rodrigo Munoz (5)
Roger Meyer (3)
Rory McCune (3)
Ross Bradley (1)
ruud-fox-it (1)
Sam Leonard (they/them) (1)
scottleitch53e8989cc3 (1)
Siddarth Adukia (2)
Simon Palmer (1)
Simon Watson (2)
Simone Salucci and Daniel Lopez Jimenez (2)
smarkelon (1)
Stefano Antenucci (1)
Stephen Tomkinson (2)
Steven van der Baan (1)
Stuart Kurutac (1)
Sultan Khan (4)
Swathi Nagarajan (1)
Tanner Prynn (2)
Thomas Pornin (10)
Viktor Gazdag (6)
Xavier Cervilla (1)
Xavier Garceau-Aranda (2)
Yun Zheng Hu (2)
Date published
Newest First
Oldest First
Apply filters
VeChain JavaScript SDK Cryptography and Security Review
Read more
Public Reports
Cryptography
13 Mar 2025
Insomnihack - Pioneering Zero Days at Pwn2Own Automotive 2024
Read more
Alex Plaskett
McCaulay Hudson
Presentations
Reverse Engineering
Vulnerability
13 Mar 2025
In-Depth Technical Analysis of the Bybit Hack
Read more
Mario Rivas
10 Mar 2025
A Rendezvous with System Management Interrupts
Read more
Carles Pey
10 Mar 2025
Weak Passwords Led to (SafePay) Ransomware…Yet Again
Read more
Threat Intelligence
10 Mar 2025
Analyzing Secure AI Architectures
Read more
nccdavid
Machine Learning
Offensive Security & Artificial Intelligence
10 Mar 2025
Analyzing Secure AI Design Principles
Read more
nccdavid
Machine Learning
Offensive Security & Artificial Intelligence
10 Mar 2025
Defending Your Directory: An Expert Guide to Combating Kerberoasting in Active Directory
Read more
Rafael Alfaro March
Rodrigo Munoz
Research
Digital Forensics and Incident Response (DFIR)
10 Mar 2025
Announcing the Cryptopals Guided Tour Video 18: Implement CTR
Read more
Eli Sohl
Cryptography
Research
Tutorial/Study Guide
10 Mar 2025
Auditing K3s Clusters
Read more
Andrew Wade
10 Mar 2025
Show more