Total results: 2509
Page 1 of 101
Filters
Topics
- Cyber Security (461)
- Research (410)
- Consulting (402)
- Technology, general (395)
- Whitepapers (238)
- Computer security (230)
- Technical advisories (225)
- Vulnerability (173)
- Cryptography (126)
- Tool Release (115)
- Hardware & Embedded Systems (114)
- Public tools (107)
- Threat Intelligence (107)
- General Consulting (95)
- Technology (86)
- Public Reports (66)
- Insights & Viewpoints (64)
- Digital Forensics and Incident Response (DFIR) (62)
- Presentations (56)
- Increasing regulatory & legislative requirements (53)
- iSec Partners (52)
- Reverse Engineering (50)
- Tutorial/Study Guide (50)
- Assessments (49)
- Growing threat landscape (45)
- Regulations & Legislation (43)
- Machine Learning (41)
- Conferences (40)
- Cloud Security (39)
- Cloud & Containerization (37)
- Securing our connected future (36)
- Patch notifications (35)
- VSR (32)
- Insight Space (28)
- North American Research (28)
- Uncategorized (28)
- Working life (26)
- Offensive Security & Artificial Intelligence (25)
- UK (24)
- Research Paper (23)
- Managed Detection & Response (22)
- Ransomware (22)
- Reducing Vulnerabilities at Scale (22)
- Transport (21)
- Fox-IT (19)
- Sustainability (18)
- Books (17)
- Detection and Threat Hunting (17)
- Standards (15)
- Third-Party Risk Management (14)
- Vulnerability Research (14)
- Emerging Technologies (13)
- Managed Detection & Response (MDR) (13)
- Gender (12)
- Public interest technology (12)
- Artificial Intelligence (11)
- Business Insights (11)
- Operational Technology (11)
- Virtualization, Emulation, & Containerization (11)
- 5G Security & Smart Environments (10)
- Gaming & Media (10)
- Inclusion and Diversity (10)
- NCC Conversations (10)
- Social issues (10)
- UK Research (10)
- #eachforequal (9)
- Blockchain (9)
- Finance (9)
- Giving Back (9)
- Politics (9)
- Risk Management & Governance (9)
- Talent and Careers (9)
- Corporate (7)
- Cyber as a Science (7)
- Fox-IT and European Research (7)
- General (7)
- Remediation (7)
- Supply Chain Management (7)
- Working Environment (7)
- Crises, Incident (6)
- Data, Telecom, IT (6)
- Engineering (6)
- Health, Health Care, Pharmaceuticals (6)
- MXDR (6)
- Security (6)
- #People - making the world safer and more secure (5)
- Annual Research Report (5)
- Crime (5)
- Government (5)
- Partnerships, cooperations (5)
- Reports (5)
- Telecom (5)
- Awards (4)
- Awards & Recognition (4)
- General data (4)
- IT Consulting (4)
- Law (4)
- Mental Health (4)
- Science, technology (4)
- Threat briefs (4)
- APAC (3)
- Academic Partnership (3)
- Business enterprise (3)
- CYBERUK (3)
- Cars and traffic (3)
- Children, Youth (3)
- Corona (3)
- Data (3)
- Gender equality (3)
- Legacy Systems (3)
- People (3)
- School (3)
- Software Resilience (3)
- Technology Policy (3)
- UK cyber security policy (3)
- USA (3)
- Crime, Law, Legal affairs (2)
- Crises (2)
- Crypto (2)
- DDoS Assured (2)
- Education (2)
- Expert Insights (2)
- Incident Response (2)
- Intern Projects (2)
- Legal affairs (2)
- Microsoft (2)
- Misinformation, Deepfakes, & Synthetic Media (2)
- PCI DSS (2)
- Politics, general (2)
- Public sector (2)
- Resources (2)
- Smart cities (2)
- Social issues, General (2)
- Sustainability/CSR (2)
- Teaching, Learning (2)
- University, University College (2)
- Webinar (2)
- escrow (2)
- future of cyber (2)
- (1)
- ADD (1)
- ADHD (1)
- Adult education (1)
- Alumni Network (1)
- Annual and interim reports (1)
- Asia Pacific Research (1)
- Business enterprise, General (1)
- CTFs/Microcorruption (1)
- Communication (1)
- Current events (1)
- Cyber Advice (1)
- Cyber Talent Development (1)
- Defence issues (1)
- Disclosure Policy (1)
- Economy (1)
- Economy, Finance (1)
- Educational sciences (1)
- Elections (1)
- Energy (1)
- Energy issues (1)
- Finance and Professional Services (1)
- Fintech (1)
- Fraud (1)
- Industry, manufacturing (1)
- Infrastructure (1)
- Investor Relations (1)
- IoT (1)
- LGBTQIA+ (1)
- Law, Justice (1)
- MDR (1)
- MISA (1)
- MVSS (1)
- Managed Detection and Response (1)
- Mental Wellbeing (1)
- Parliament (1)
- Petroleum, Oil, Gas (1)
- Pride (1)
- Radio, TV (1)
- Science, general (1)
- Secure Development Lifecycle (SDL) (1)
- Sentinel (1)
- Services, Consulting (1)
- Society (1)
- Solutions (1)
- Spa, fitness, well-being (1)
- Supply Chain (1)
- Telecommunication, mobile telephony (1)
- Training (1)
- Web services (1)
- collaboration (1)
- computer misuse act (1)
- critical national infrastructure (1)
- cyber resilience (1)
- deepfake (1)
- healthcare (1)
- hospital (1)
- legal (1)
- next generation talent (1)
- protocol_name (1)
- recruitment (1)
- remediate (1)
- remediation (1)
- remote working (1)
- security consultant (1)
- smart tvs (1)
- threatintel (1)
Sectors
- Research (1328)
- News (419)
- Article (266)
- Press Release (121)
- Case Studies (50)
- Transport (23)
- Financial Services (22)
- Public Sector & Government Services (17)
- Whitepapers (16)
- Tech, Media & Telecoms (15)
- Cyber Advice & Insights (13)
- Events (9)
- Healthcare (9)
- Webinars (8)
- Energy & Utilities (7)
- Videos (7)
- Guides & Datasheets (6)
- Retail & Consumer Markets (6)
- Education (5)
- Expert Commentary (5)
- Maritime (5)
- Aviation & Aerospace (4)
- Government Affairs (4)
- Manufacturing (4)
- (3)
- Software Vendors (3)
- Commodities (2)
- Legal & Professional Services (2)
- Infographics (1)
- Report (1)
- Software Resilience (1)
Managed XDR
NCC Group named among notable providers in Forrester’s The Managed Detection and Response Services Landscape in Europe, Q3 2023. Let us focus on your security, so you can focus on your business. Our Managed XDR solution combines the power of our market leading ethical hackers with next generation…
Staying secure in a changing agricultural landscape
News Technology, general Consulting Research Insights & Viewpoints Agriculture is essential for modern society. Arguably, it has never been more important – with climate change, population growth, demographic changes, and water scarcity, it’s vital that the food industry adapts and adopts technology…
IDC Whitepaper Download
Thanks for your interest! Your copy of the IDC whitepaper, "How Managed XDR Bolsters Businesses’ Cybersecurity Posture," is now available to view or save: Download whitepaper
Maintaining a sustainable cyber security strategy
Download to read our top four solutions for: Defending your organisation from compromise Protecting sensitive personal information Boosting overall cyber security maturity Delivering quantifiable strategic value to your organisation Read an alternative perspective on the value of meeting your comp…
Outsourcing global cyber norms
News Technology, general Consulting Insights & Viewpoints Making cyberspace safe and secure on a global scale has long been on the agenda for the public and private sectors alike. So far, the responsibility for delivering this has mostly sat with governments, with the expectation being that organisa…
Minimize business disruptions
Whether you manage a small business or a multi-million-dollar conglomerate - security matters. With the recent spate of highly publicized attacks, Australians now take data privacy very seriously. Did you know that 47% of Australians would stop buying from an organisation that experienced a breach…
Annual Cyber Threat Monitor and Research Report
Get Ahead in 2025 Sign up now to receive immediate access to NCC Group’s Threat Monitor and our latest Research Paper. Annual Cyber Threat Monitor Report This report reviews the key events that shaped the cyber threat landscape in 2024 and provides insights into what to expect in the coming year. Av…
Cyber Threat Intelligence:
The APAC market is a prime target for stealthy threat actors and amateur hackers alike. Unconstrained by budgets or ethical considerations, these adversaries don’t do business-as-usual. A set and forget strategy is therefore not a realistic defence. Cyber Threat Intelligence (CTI) is critical for…
Legacy Technology in Transport: More Than “Old Tech”
This isn’t a formal paper so much as a documented think-through: a reflective write-up born from running into “legacy” everywhere in practice and needing to get precise about it. In mainstream IT, “legacy” often means out-of-support, fragile, and risky... Tidy enough. In transport and other long-liv…
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
Research Threat Intelligence Authors: William Backhouse (@Will0x04), Michael Mullen (@DropTheBase64) and Nikolaos Pantazopoulos Summary tl;dr This post explores some of the TTPs employed by a threat actor who was observed deploying ShadowPad during an incident response engagement. Below provides a s…
Take 10 on 10 for World Mental Health Day
News Technology, general Consulting Mental Health Sustainability On World Mental Health Day on 10 October, we’ll be encouraging colleagues to take 10 minutes out to reflect on their own mental health. Our take 10 on 10 October, part of NCC Group’s NCC Cares programme is designed to encourage colleag…
'30 Minutes' webinar series – CISO in the time of Coronavirus – listen back
News Technology, general Consulting Computer security Corona As part of our ‘30 Minutes’ webinar series last month, NCC Group’s Global Chief Information Security Officer, Dominic Beecher, shared his reflections on what it has been like to be a CISO during the last few months and the challenge of mov…
Defending Your Directory: An Expert Guide to Securing Active Directory Against DCSync Attacks
In our latest technical blog series, our DFIR team are highlighting the most prominent Active Directory (AD) threats, describing the tell-tale signs that your AD might be at risk, and give experienced insight into the best prevention and mitigation strategies to shore up your AD security and bolster…
NCC Group responds to Cyber Security Agency of Singapore ('CSA') public consultation on licensing
News Technology, general Consulting Computer security Increasing regulatory & legislative requirements Cyber Security A new licensing framework proposed by the Cyber Security Agency of Singapore ('CSA') is expected to launch early next year, requiring cyber security providers to be licensed before p…
LibAVCodec AMV Out of Array Write
Research Cyber Security Technical advisories Summary – 31.07.2011 Name: LibAVCodec AMV Out of Array Write Release Date: 31 July 2011 Reference: NGS00068 Discoverer: Dominic Chell Vendor: VideoLAN Vendor Reference: CVE-2011-1931 Systems Affected: VLC media player 1.1.9 and earlier releases Risk: Hig…
Sifting through the spines: identifying (potential) Cactus ransomware victims
Research Fox-IT and European Research Digital Forensics and Incident Response (DFIR) Vulnerability Research Authored by Willem Zeeman and Yun Zheng Hu This blog is part of a series written by various Dutch cyber security firms that have collaborated on the Cactus ransomware group, which exploits Qli…
NCC Group partners with CyCognito to provide external attack surface management solution
We’re delighted to announce that we’ve added CyCognito’s technology to our Attack Surface Management (ASM) portfolio, to help clients discover all of their externally facing assets and mitigate the risk of critical points of exposure that attackers can most easily exploit. People-powered, tech-ena…
NCC Group announces partnership with Dragos to deliver Operational Technology (OT) resilience
Press Release Today we are pleased to announce a new partnership with Dragos, a global leader in industrial cyber security technology, to safeguard operational technology (OT) environments against the threat of cyber compromise through our Facility Due Diligence (FDD) service. Today, OT cyber attack…
NCC Group Monthly Threat Pulse – Review of June 2024
Steep decline in LockBit 3.0 attacks sees reduced ransomware levels across June Total ransomware cases in June were lower than the average for the year, at 331 attacks. LockBit 3.0 showed a significant decrease in activity, with only 11 attacks. Industrials remains the most targeted sector, accounti…
NCC Group Recognized in 2024 Splunk Partner Awards
NCC Group Named 2024 Splunk Global Services Market Partner of the Year Winner for Outstanding Partnership June 12, 2024 – NCC Group, global cyber security expert, announced today it has received the 2024 Splunk Global Services Market Partner of the Year award as well as the EMEA 2024 Regional Servic…
AI: the new frontier of cyber threats
As we look ahead to 2025 and beyond, the cyber security landscape continues to evolve at an unprecedented pace. Emerging technologies, expanding regulatory pressures, and the continuing innovation of threat actors are shaping a future where security and resilience are more critical than ever. Our e…
BlackHat USA 2024: NCC Group reveals research on Sonos devices that could have allowed an attacker to compromise, eavesdrop and record conversations
This week at the Black Hat USA security conference, NCC Group revealed its latest research into the safety and security of consumer connectable products, sharing details of vulnerabilities researchers found in a range of Sonos smart speakers. The vulnerabilities, which have since been patched by Son…
NCC Group Monthly Threat Pulse – Review of December 2024
Press Release Threat Intelligence December 2024 breaks records with the highest-ever monthly amount of ransomware events logged December represents the highest number of ransomware cases observed since NCC Group began monitoring ransomware activity in 2021, with 574 attacks. New threat actor Funksec…
Rustproofing Linux (Part 1/4 Leaking Addresses)
Research Reducing Vulnerabilities at Scale Research Tutorial/Study Guide Hardware & Embedded Systems Emerging Technologies Rust is a programming language guaranteeing memory and thread safety while still being able to access raw memory and hardware. This sounds impossible, and it is, that’s why Rust…
Cryptopals: Exploiting CBC Padding Oracles
Research Tutorial/Study Guide Cryptography This is a write-up of the classic padding oracle attack on CBC-mode block ciphers. If you’ve done the Cryptopals cryptography challenges, you’ll remember it as challenge 17. This is a famous and elegant attack. With it, we will see how even a small data lea…