unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
On Multiplications with Unsaturated Limbs
This post is about a rather technical coding strategy choice that arises whe...
2023-9-19 01:4:8 | 阅读: 4 |
收藏
|
NCC Group Research - research.nccgroup.com
risc
addcarry
crrl
limbs
dalek
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
Authored by Joshua Kamp (main author) and Alberto Segura.SummaryHoo...
2023-9-11 17:3:24 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
ermac
victim
c2
decompiled
Ruling the rules
Mathew Vermeer is a doctoral candidate at the Organisation Governance dep...
2023-9-8 22:55:30 | 阅读: 5 |
收藏
|
NCC Group Research - research.nccgroup.com
fox
nids
security
network
ruleset
HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack
Aaron Adams presented this talk at HITB Phuket on the 24th August 2023. The...
2023-8-31 17:23:20 | 阅读: 5 |
收藏
|
NCC Group Research - research.nccgroup.com
postscript
network
security
lexmark
motivated
Public Report – Entropy/Rust Cryptography Review
During the summer of 2023, Entropy Cryptography Inc engaged NCC Group’s Cry...
2023-8-31 00:0:0 | 阅读: 11 |
收藏
|
NCC Group Research - research.nccgroup.com
github
rustcrypto
network
security
elliptic
SIAM AG23: Algebraic Geometry with Friends
I recently returned from Eindhoven, where I had the pleasure of giving...
2023-8-29 17:0:0 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
isogenies
elliptic
isogeny
sqisign
curves
5G security – how to minimise the threats to a 5G network
To ensure security of new 5G telecom networks, NCC Group has been providing...
2023-8-28 09:0:0 | 阅读: 16 |
收藏
|
NCC Group Research - research.nccgroup.com
network
security
attacker
software
4g
Real World Cryptography Conference 2023 – Part II
After a brief interlude, filled with several articles from the Cryptography...
2023-8-25 21:0:0 | 阅读: 11 |
收藏
|
NCC Group Research - research.nccgroup.com
fhe
e2ee
ecdsa
security
Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities
Multiple Unauthenticated SQL Injection Issues Security Filter Bypass – CV...
2023-8-24 21:8:34 | 阅读: 34 |
收藏
|
NCC Group Research - research.nccgroup.com
gms
attacker
richard
warren
LeaPFRogging PFR Implementations
Back in October of 2022, this announcement by AMI caught my eye. AMI has co...
2023-8-23 21:51:37 | 阅读: 10 |
收藏
|
NCC Group Research - research.nccgroup.com
pfr
firmware
tektagon
spi
security
Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG
Random number generators are the backbone of most cryptographic protocols,...
2023-8-22 21:0:0 | 阅读: 9 |
收藏
|
NCC Group Research - research.nccgroup.com
prng
probability
security
Public Report – Penumbra Labs R1CS Implementation Review
In July 2023 Penumbra Labs engaged NCC Group’s Cryptography Services team t...
2023-8-21 23:59:58 | 阅读: 4 |
收藏
|
NCC Group Research - research.nccgroup.com
lattice
netscalers
r1cs
proofs
Demystifying Multivariate Cryptography
As the name suggests, multivariate cryptography refers to a class of public...
2023-8-19 00:38:54 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
np
vinegar
uov
rvv
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
IntroductionThis two-part blog series aims to build some intuition for...
2023-8-17 23:32:31 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
lattice
schemes
dilithium
sis
Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign
Fox-IT (part of NCC Group) has uncovered a large-scale exploitation campaig...
2023-8-15 21:29:33 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
netscalers
citrix
divd
3519
netscaler
SysPWN – VR for Pwn2Own
Alex Plaskett (@alexjplaskett) presented a talk on the 10th of August 2023...
2023-8-11 16:11:39 | 阅读: 6 |
收藏
|
NCC Group Research - research.nccgroup.com
printer
lattice
resistant
trapdoor
Intel BIOS Advisory – Memory Corruption in HID Drivers
This advisory is the third in a series of posts that cover vulnerabilities...
2023-8-8 20:28:13 | 阅读: 10 |
收藏
|
NCC Group Research - research.nccgroup.com
hid
reportitem
tempreport
bitindex
hidkbdev
Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures
IntroductionSince the first lattice-based cryptography results in [Ajta...
2023-7-25 06:0:45 | 阅读: 14 |
收藏
|
NCC Group Research - research.nccgroup.com
lattice
trapdoor
gaussian
cvp
lattices
Tool Release: Cartographer
IntroductionThere’s no doubt that reverse engineering can be a very com...
2023-7-21 05:6:0 | 阅读: 5 |
收藏
|
NCC Group Research - research.nccgroup.com
ghidra
loaded
reverse
animal
Tool Release – ScoutSuite 5.13.0
We are excited to announce the release of a new version of our open-source,...
2023-7-5 22:5:4 | 阅读: 3 |
收藏
|
NCC Group Research - research.nccgroup.com
corrections
bugfixes
security
lattice
resistant
Previous
1
2
3
4
5
6
7
8
Next