unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Tool Release – JWT-Reauth
When testing APIs with short-lived authentication tokens, it can be frustr...
2022-8-26 00:20:19 | 阅读: 40 |
收藏
|
research.nccgroup.com
reauth
burp
proxy
github
Back in Black: Unlocking a LockBit 3.0 Ransomware Attack
Authored by: Ross Inman (@rdi_x64)tl;drThis post explores some...
2022-8-19 22:30:21 | 阅读: 92 |
收藏
|
research.nccgroup.com
windows
cobalt
ransomware
lockbit
Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling
Authored by: Jesús Miguel Calderón MarínIntroductionTwo years ago I carried out research...
2022-8-17 03:50:20 | 阅读: 37 |
收藏
|
research.nccgroup.com
wheel
betting
winning
segments
positions
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
Max Groot & Ruud van LuijkTL;DRA recently uncovered malware sample dubbed ‘Saitama’ was...
2022-8-11 23:20:24 | 阅读: 26 |
收藏
|
research.nccgroup.com
saitama
c2
client
tunnelling
fox
Implementing the Castryck-Decru SIDH Key Recovery Attack in SageMath
IntroductionLast weekend (July 30th) a truly incredible piece of mathematical/cryptanalysis...
2022-8-9 05:44:48 | 阅读: 35 |
收藏
|
research.nccgroup.com
sagemath
sidh
isogeny
magma
isogenies
Top of the Pops: Three common ransomware entry techniques
by Michael Mathews Ransomware has been a concern for everyone over the past several years be...
2022-8-4 15:30:11 | 阅读: 26 |
收藏
|
research.nccgroup.com
network
ransomware
security
remote
affiliates
NCC Group Research at Black Hat USA 2022 and DEF CON 30
This year, NCC Group researchers will be presenting at least five presentations at Black Hat USA...
2022-8-4 04:15:44 | 阅读: 39 |
收藏
|
research.nccgroup.com
security
bias
usa
microsoft
pipelines
Technical Advisory – Multiple vulnerabilities in Nuki smart locks (CVE-2022-32509, CVE-2022-32504, CVE-2022-32502, CVE-2022-32507, CVE-2022-32503, CVE-2022-32510, CVE-2022-32506, CVE-2022-32508, CVE-2022-32505)
The following vulnerabilities were found as part of a research project looking at the state of s...
2022-7-25 16:30:0 | 阅读: 94 |
收藏
|
research.nccgroup.com
nuki
writeread
keyturner
lr
keypad
NIST Selects Post-Quantum Algorithms for Standardization
Last week, NIST announced some algorithms selected for standardization as part of their Post-Qua...
2022-7-14 04:4:34 | 阅读: 26 |
收藏
|
research.nccgroup.com
falcon
lattice
dilithium
crystals
sphincs
Climbing Mount Everest: Black-Byte Bytes Back?
Authored by: Michael Mullen and Nikolaos PantazopoulosSummarytl;dr...
2022-7-14 02:22:31 | 阅读: 55 |
收藏
|
research.nccgroup.com
ransomware
everest
remote
network
utilised
Five Essential Machine Learning Security Papers
We recently published “Practical Attacks on Machine Learning Systems”, which has a very large re...
2022-7-8 01:17:9 | 阅读: 21 |
收藏
|
research.nccgroup.com
trained
papers
adversarial
arxiv
datasets
Whitepaper – Practical Attacks on Machine Learning Systems
Written by Chris Anley, Chief Scientist, NCC Group This paper collects...
2022-7-7 02:36:42 | 阅读: 45 |
收藏
|
research.nccgroup.com
security
jennifer
fernick
processes
anley
Flubot: the evolution of a notorious Android Banking Malware
Originally published June 29, 2022 on the Fox-IT blogAuthored by Alberto Segura (main author...
2022-7-6 03:58:16 | 阅读: 36 |
收藏
|
research.nccgroup.com
flubot
tas
c2
smishing
dga
Technical Advisory – ExpressLRS vulnerabilities allow for hijack of control link
Vendor: ExpressLRS Vendor URL: https://expresslrs.org Versions affected...
2022-7-1 02:15:0 | 阅读: 15 |
收藏
|
research.nccgroup.com
expresslrs
fhss
transmitter
receiver
phrase
Updated: Technical Advisory and Proofs of Concept – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)
By Nicolas Bidron, and Nicolas Guigo.[Editor’s note: This is an updated/expanded version of...
2022-6-17 05:15:40 | 阅读: 60 |
收藏
|
research.nccgroup.com
hole
payload
thisfrag
fragment
offset8
Understanding the Impact of Ransomware on Patient Outcomes – Do We Know Enough?
The healthcare sector and ransomware attacks appear together frequently in the media. Since befo...
2022-6-16 16:15:0 | 阅读: 26 |
收藏
|
research.nccgroup.com
ransomware
healthcare
patient
outcomes
Public Report – Threshold ECDSA Cryptography Review
In March 2022, DFINITY engaged NCC Group to conduct a security and cryptog...
2022-6-16 02:4:38 | 阅读: 19 |
收藏
|
research.nccgroup.com
ecdsa
threshold
jennifer
fernick
eprint
Exception Handling and Data Integrity in Salesforce
Robust exception handling is one of the tenets of best practice for development, no matter what...
2022-6-15 04:9:58 | 阅读: 27 |
收藏
|
research.nccgroup.com
database
dml
salesforce
apex
apexcode
Technical Advisory – Multiple Vulnerabilities in Trendnet TEW-831DR WiFi Router (CVE-2022-30325, CVE-2022-30326, CVE-2022-30327, CVE-2022-30328, CVE-2022-30329)
The Trendnet TEW-831DR WiFi Router was found to have multiple vulnerabilities exposing the owner...
2022-6-11 02:29:34 | 阅读: 104 |
收藏
|
research.nccgroup.com
trendnet
tew
attacker
831dr
firmware
Shining the Light on Black Basta
Authored by: Ross Inman (@rdi_x64) and Peter Gurneytl;drThis blog post documents som...
2022-6-6 22:36:39 | 阅读: 70 |
收藏
|
research.nccgroup.com
basta
windows
ransomware
encryption
network
Previous
9
10
11
12
13
14
15
16
Next