unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
Not so lucky: BlackCat is back! Authors: Alex Jessop @ThisIsFineChief...
2023-11-1 04:1:57 | 阅读: 18 |
收藏
|
NCC Group Research - research.nccgroup.com
ransomware
windows
blackcat
veeam
Public Report – Zcash FROST Security Assessment
Here are some related articles you may find interesting...
2023-10-23 20:6:7 | 阅读: 11 |
收藏
|
NCC Group Research - research.nccgroup.com
caliptra
connectize
g6
security
Technical Advisory – Multiple Vulnerabilities in Connectize G6 AC2100 Dual Band Gigabit WiFi Router (CVE-2023-24046, CVE-2023-24047, CVE-2023-24048, CVE-2023-24049, CVE-2023-24050, CVE-2023-24051, CVE-2023-24052)
Connectize’s G6 WiFi router was found to have multiple vulnerabilities expo...
2023-10-19 21:53:42 | 阅读: 15 |
收藏
|
NCC Group Research - research.nccgroup.com
attacker
connectize
victim
network
g6
Public Report – Caliptra Security Assessment
During August and September of 2023, Microsoft engaged NCC Group to conduct...
2023-10-19 02:26:29 | 阅读: 13 |
收藏
|
NCC Group Research - research.nccgroup.com
caliptra
security
firmware
dpe
rom
Introduction to AWS Attribute-Based Access Control
AWS allows tags, arbitrary key-value pairs, to be assigned to many resources...
2023-10-2 20:1:0 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
sns
ec2
tagging
abac
resourcetag
On Multiplications with Unsaturated Limbs
This post is about a rather technical coding strategy choice that arises whe...
2023-9-19 01:4:8 | 阅读: 10 |
收藏
|
NCC Group Research - research.nccgroup.com
risc
addcarry
crrl
limbs
dalek
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
Authored by Joshua Kamp (main author) and Alberto Segura.SummaryHoo...
2023-9-11 17:3:24 | 阅读: 30 |
收藏
|
NCC Group Research - research.nccgroup.com
ermac
victim
c2
decompiled
Ruling the rules
Mathew Vermeer is a doctoral candidate at the Organisation Governance dep...
2023-9-8 22:55:30 | 阅读: 12 |
收藏
|
NCC Group Research - research.nccgroup.com
fox
nids
security
network
ruleset
HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack
Aaron Adams presented this talk at HITB Phuket on the 24th August 2023. The...
2023-8-31 17:23:20 | 阅读: 12 |
收藏
|
NCC Group Research - research.nccgroup.com
postscript
network
security
lexmark
motivated
Public Report – Entropy/Rust Cryptography Review
During the summer of 2023, Entropy Cryptography Inc engaged NCC Group’s Cry...
2023-8-31 00:0:0 | 阅读: 21 |
收藏
|
NCC Group Research - research.nccgroup.com
github
rustcrypto
network
security
elliptic
SIAM AG23: Algebraic Geometry with Friends
I recently returned from Eindhoven, where I had the pleasure of giving...
2023-8-29 17:0:0 | 阅读: 16 |
收藏
|
NCC Group Research - research.nccgroup.com
isogenies
elliptic
isogeny
sqisign
curves
5G security – how to minimise the threats to a 5G network
To ensure security of new 5G telecom networks, NCC Group has been providing...
2023-8-28 09:0:0 | 阅读: 23 |
收藏
|
NCC Group Research - research.nccgroup.com
network
security
attacker
software
4g
Real World Cryptography Conference 2023 – Part II
After a brief interlude, filled with several articles from the Cryptography...
2023-8-25 21:0:0 | 阅读: 18 |
收藏
|
NCC Group Research - research.nccgroup.com
fhe
e2ee
ecdsa
security
Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities
Multiple Unauthenticated SQL Injection Issues Security Filter Bypass – CV...
2023-8-24 21:8:34 | 阅读: 47 |
收藏
|
NCC Group Research - research.nccgroup.com
gms
attacker
richard
warren
LeaPFRogging PFR Implementations
Back in October of 2022, this announcement by AMI caught my eye. AMI has co...
2023-8-23 21:51:37 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
pfr
firmware
tektagon
spi
security
Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG
Random number generators are the backbone of most cryptographic protocols,...
2023-8-22 21:0:0 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
prng
probability
security
Public Report – Penumbra Labs R1CS Implementation Review
In July 2023 Penumbra Labs engaged NCC Group’s Cryptography Services team t...
2023-8-21 23:59:58 | 阅读: 14 |
收藏
|
NCC Group Research - research.nccgroup.com
lattice
netscalers
r1cs
proofs
Demystifying Multivariate Cryptography
As the name suggests, multivariate cryptography refers to a class of public...
2023-8-19 00:38:54 | 阅读: 21 |
收藏
|
NCC Group Research - research.nccgroup.com
np
vinegar
uov
rvv
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
IntroductionThis two-part blog series aims to build some intuition for...
2023-8-17 23:32:31 | 阅读: 16 |
收藏
|
NCC Group Research - research.nccgroup.com
lattice
schemes
dilithium
sis
Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign
Fox-IT (part of NCC Group) has uncovered a large-scale exploitation campaig...
2023-8-15 21:29:33 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
netscalers
citrix
divd
3519
netscaler
Previous
3
4
5
6
7
8
9
10
Next