Total results: 2576
Page 1 of 104
Filters
Topics
- Cyber Security (461)
- Research (410)
- Consulting (404)
- Technology, general (395)
- Whitepapers (239)
- Computer security (232)
- Technical advisories (225)
- Vulnerability (172)
- Cryptography (126)
- Hardware & Embedded Systems (116)
- Tool Release (115)
- Threat Intelligence (108)
- Public tools (107)
- General Consulting (95)
- Technology (89)
- Public Reports (66)
- Insights & Viewpoints (64)
- Digital Forensics and Incident Response (DFIR) (63)
- Presentations (56)
- Increasing regulatory & legislative requirements (53)
- Reverse Engineering (53)
- iSec Partners (52)
- Assessments (50)
- Tutorial/Study Guide (50)
- Growing threat landscape (45)
- Regulations & Legislation (45)
- Machine Learning (41)
- Cloud Security (40)
- Conferences (39)
- Cloud & Containerization (37)
- Securing our connected future (36)
- Patch notifications (35)
- VSR (32)
- Insight Space (28)
- North American Research (28)
- Uncategorized (28)
- Working life (26)
- Offensive Security & Artificial Intelligence (25)
- UK (24)
- Research Paper (23)
- Managed Detection & Response (22)
- Ransomware (22)
- Reducing Vulnerabilities at Scale (22)
- Transport (21)
- Fox-IT (19)
- Detection and Threat Hunting (18)
- Sustainability (18)
- Books (17)
- Standards (15)
- Vulnerability Research (15)
- Third-Party Risk Management (14)
- Emerging Technologies (13)
- Managed Detection & Response (MDR) (13)
- Artificial Intelligence (12)
- Gender (12)
- Public interest technology (12)
- 5G Security & Smart Environments (11)
- Business Insights (11)
- Operational Technology (11)
- Virtualization, Emulation, & Containerization (11)
- Gaming & Media (10)
- Inclusion and Diversity (10)
- NCC Conversations (10)
- Social issues (10)
- UK Research (10)
- #eachforequal (9)
- Blockchain (9)
- Finance (9)
- Giving Back (9)
- Politics (9)
- Risk Management & Governance (9)
- Talent and Careers (9)
- Corporate (7)
- Cyber as a Science (7)
- Fox-IT and European Research (7)
- General (7)
- Remediation (7)
- Security (7)
- Supply Chain Management (7)
- Working Environment (7)
- Crises, Incident (6)
- Data, Telecom, IT (6)
- Engineering (6)
- Health, Health Care, Pharmaceuticals (6)
- MXDR (6)
- Telecom (6)
- #People - making the world safer and more secure (5)
- Annual Research Report (5)
- Crime (5)
- Government (5)
- IT Consulting (5)
- Partnerships, cooperations (5)
- Reports (5)
- Awards (4)
- Awards & Recognition (4)
- General data (4)
- Law (4)
- Mental Health (4)
- Science, technology (4)
- Threat briefs (4)
- APAC (3)
- Academic Partnership (3)
- Business enterprise (3)
- CYBERUK (3)
- Cars and traffic (3)
- Children, Youth (3)
- Corona (3)
- Data (3)
- Gender equality (3)
- Legacy Systems (3)
- People (3)
- School (3)
- Software Resilience (3)
- Technology Policy (3)
- UK cyber security policy (3)
- USA (3)
- Crime, Law, Legal affairs (2)
- Crises (2)
- Crypto (2)
- DDoS Assured (2)
- Education (2)
- Expert Insights (2)
- Incident Response (2)
- Intern Projects (2)
- Legal affairs (2)
- Microsoft (2)
- Misinformation, Deepfakes, & Synthetic Media (2)
- PCI DSS (2)
- Politics, general (2)
- Public sector (2)
- Resources (2)
- Smart cities (2)
- Social issues, General (2)
- Sustainability/CSR (2)
- Teaching, Learning (2)
- University, University College (2)
- Webinar (2)
- escrow (2)
- future of cyber (2)
- (1)
- ADD (1)
- ADHD (1)
- Adult education (1)
- Alumni Network (1)
- Annual and interim reports (1)
- Asia Pacific Research (1)
- Business enterprise, General (1)
- CTFs/Microcorruption (1)
- Communication (1)
- Current events (1)
- Cyber Advice (1)
- Cyber Talent Development (1)
- Defence issues (1)
- Disclosure Policy (1)
- Economy (1)
- Economy, Finance (1)
- Educational sciences (1)
- Elections (1)
- Energy (1)
- Energy issues (1)
- Finance and Professional Services (1)
- Fintech (1)
- Fraud (1)
- Industry, manufacturing (1)
- Infrastructure (1)
- Investor Relations (1)
- IoT (1)
- LGBTQIA+ (1)
- Law, Justice (1)
- MDR (1)
- MISA (1)
- MVSS (1)
- Managed Detection and Response (1)
- Mental Wellbeing (1)
- Parliament (1)
- Petroleum, Oil, Gas (1)
- Pride (1)
- Radio, TV (1)
- Science, general (1)
- Secure Development Lifecycle (SDL) (1)
- Sentinel (1)
- Services, Consulting (1)
- Society (1)
- Solutions (1)
- Spa, fitness, well-being (1)
- Supply Chain (1)
- Telecommunication, mobile telephony (1)
- Training (1)
- Web services (1)
- collaboration (1)
- computer misuse act (1)
- critical national infrastructure (1)
- cyber resilience (1)
- deepfake (1)
- healthcare (1)
- hospital (1)
- legal (1)
- next generation talent (1)
- protocol_name (1)
- recruitment (1)
- remediate (1)
- remediation (1)
- remote working (1)
- security consultant (1)
- smart tvs (1)
- threatintel (1)
Sectors
- Research (1333)
- News (419)
- Article (268)
- Press Release (124)
- Case Studies (54)
- Transport (24)
- Financial Services (22)
- Public Sector & Government Services (17)
- Tech, Media & Telecoms (16)
- Whitepapers (16)
- Cyber Advice & Insights (14)
- Events (9)
- Healthcare (9)
- Energy & Utilities (8)
- Webinars (8)
- Videos (7)
- Guides & Datasheets (6)
- Maritime (6)
- Retail & Consumer Markets (6)
- Education (5)
- Expert Commentary (5)
- Aviation & Aerospace (4)
- Government Affairs (4)
- Manufacturing (4)
- (3)
- Software Vendors (3)
- Commodities (2)
- Legal & Professional Services (2)
- Report (2)
- Infographics (1)
- Software Resilience (1)
Assessing the security and privacy of Vaccine Passports
Research Research Public interest technology There has been a lot of development lately in the field of health credentials, especially in the field of vaccine credentials. This has largely been driven by a perceived need to track and validate an individual’s vaccination status with respect to COVID-…
8 Reasons Quantifying Cyber Risk is Essential for Unleashing Business Growth
Article Consulting In this article: • Businesses need data-driven Cyber Risk Quantification to shatter the illusion of objectivity in their current risk assessments. • CRQ can drive better decision making, build organizational resilience and provide a competitive edge. • This process can even reduce…
NCC Group partners with TransUnion to provide cyber protection to insurance customers at scale globally
Press Release Technology, general Consulting Computer security Global cyber security specialists, NCC Group, and global insights and information company, TransUnion, have announced a partnership that will help protect consumers around the world from online threats and malicous cyber attacks. TruEmpo…
Whitepaper: Recognizing and Preventing TOCTOU
Research Research Whitepapers Uncategorized iSec Partners This research was originally performed by researchers from iSec Partners (now NCC Group), and has been migrated to research.nccgroup.com for posterity, and can be downloaded below. Recognizing and Preventing TOCTOU Whitepaper 03 Mar 2015 – Ch…
Ransoms and beyond
While many organisations had part-time remote working policies in place before 2020, the last year has taken this way of working to a whole new level. In the last year, many organisations hastily implemented changes to their day-to-day operations to support the business requirements without the prop…
New Australian cyber laws set to enhance business requirements
News The Australian Government has introduced a new Cyber Security Legislation Package to Parliament, seeking to establish a clearer legislative framework and enhancing cyber security obligations placed on businesses. The Bill implements the following key measures: A new power to mandate security…
RIFT: Citrix ADC Vulnerabilities CVE-2020-8193, CVE-2020-8195 and CVE-2020
Research Threat Intelligence tl;dr Citrix disclosed on July 7th, 2020 a number of vulnerabilities in the Application Delivery Controller. This blog is a summary of what we know as the situation develops. About the Research and Intelligence Fusion Team (RIFT): RIFT leverages our strategic analysis, d…
NCC Group joins Auto
NCC Group is delighted to become a strategic partner of the Automotive Information Sharing and Analysis Center (Auto-ISAC), a global automotive industry membership collective committed to advancing cyber security. Auto-ISAC is a key platform for manufacturers, suppliers, and other stakeholders to s…
Professional C Programming LiveLessons, (Video Training) Part I: Writing Robust, Secure, Reliable Code
Research Cyber Security Books Author: Robert Seacord Robert Seacord, principal security consultant at NCC Group, has created a video book showcasing LiveLessons on professional C programming. The video book provides an in-depth explanation of how to use common C language features to produce robust,…
IODIDE
Research Cyber Security Public tools IODIDE – The IOS Debugger and Integrated Disassembler Environment Released as open source by NCC Group Plc Developed by Andy Davis, andy dot davis at nccgroup dot com To download visit: https://github.com/nccgroup/IODIDE Released under AGPL see LICENSE for more i…
A Look at RTEMS Security
NCC Group conducted a time-boxed security assessment of the Real-Time Executive for Multiprocessor Systems (RTEMS) project. RTEMs is a real-time operating system geared towards small and medium-sized embedded systems, and has been deployed in a wide array of environments ranging from satellites and…
Lending a hand to the community – Covenant v0.7 Updates
Research Research Tutorial/Study Guide Tool Release Introduction Covenant [1] is an open source .NET command and control framework to support Red Team operations, similar in many ways to the well-known Cobalt Strike threat emulation software. Covenant is an ASP.NET Core, cross-platform application t…
Discover View, NCC Group's new enhanced secure depositing portal
News Technology, general Consulting Every software supplier or software end user that we work with is ultimately protecting its business, enhancing its resilience and ensuring long term availability of software through the regular deposit of the code or materials that are required to access, or rebu…
Choosing the Right MCU for Your Embedded Device — Desired Security Features of Microcontrollers
Research Research Hardware & Embedded Systems The Microcontroller Unit (MCU) is the heart of an embedded device, where the main firmware executes its instructions to carry out the system’s functions. These come in many varieties. Relatively simple microcontrollers with limited-resource processors ma…
Cyber Essentials: Helping our customers to build solid security foundations remotely
News Technology, general Consulting UK Insights & Viewpoints The UK government-backed Cyber Essentials scheme, introduced in 2014 and recently relaunched with the IASME Consortium, has become a firm part of the cyber security journey of many organisations. The scheme provides a security assessment a…
Looking ahead to the future of the UK’s cyber security sector
News Technology, general Consulting Computer security A report from the UK government, the UK Cyber Security Sectoral Analysis 2020, has been published today, analysing the rapid growth of the UK’s cyber security industry over the last two years. It has revealed that total revenues in the sector hav…
Why Integrated Cyber Risk Management Matters to Investment Management Firms
Article Third-Party Risk Management Financial Services Reshaping cyber security for the investment management industry The convergence of digital transformation and globalisation will reshape the investment management industry over the next five years. As this convergence materialises, data privacy…
Research Insights Volume 9 – Modern Security Vulnerability Discovery
Research Cyber Security Whitepapers NCC Group’s latest Research Insights paper provides a view on modern vulnerability discovery approaches. The identification of vulnerabilities and understanding what is involved in their exploitation has numerous applications in both the attack and defence side of…
Attacking the Windows Kernel (Black Hat Las Vegas 2007)
Research Cyber Security Whitepapers This paper is focused on Windows and the Intel Architecture, and will briefly outline the current supervisor boundaries provided. Different attack vectors, along with relevant examples, will be provided to demonstrate how to attack the supervisor from the perspect…
NCC Group provides incident response to three London councils
4 December 2025 - NCC Group, a leading cyber security and resilience company, is providing incident response support to three London councils impacted by a cyber attack. The tri-borough group are: The Royal Borough of Kensington and Chelsea; Westminster City Council; and the London Borough of Hammer…
Integrating DigitalOcean into ScoutSuite
Research Tool Release We are excited to announce the addition of a new provider in our open-source, multi-cloud auditing tool ScoutSuite (on GitHub)! In April, we received a remarkable pull request from Asif Wani, Product Security Lead at DigitalOcean APAC, to integrate DigitalOcean services into Sc…
Chrome Password Manager Cross Origin Weakness
Research Research Technical advisories VSR Virtual Security Research, LLC. http://www.vsecurity.com/ Security Advisory -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Advisory Name: Chrome Password Manager Cross Origin Weakness Release Date: 2010-02-15 Application: Go…
Tool Release: iOS SSL Kill Switch v0.5 Released
Research Research Tool Release iSec Partners This research was originally performed by researchers from iSec Partners (now NCC Group), and has been migrated to research.nccgroup.com for posterity iOS SSL Kill Switch v0.5 Released 20 Aug 2013 – Alban Diquet Version 0.5 of the iOS SSL Kill Switch is n…
Elkien verlengt contract met Fox
Delft, 14 May 2025 - Elkien is een grote woningcorporatie in Friesland. Met zo’n kleine 20.000 woningen beschikt de corporatie over veel vertrouwelijke en persoonsgegevens van huurders. Elkien en Fox-IT werken voor de beveiliging van deze data nauw samen. Deze samenwerking is nu verlengd met 5 jaar.…
NCC Group Q1 Threat Report Update: Exploits publicly available for 29% of critical vulnerabilities discovered
News Technology, general Consulting Growing threat landscape Cyber Security Research Research from NCC Group’s Research and Intelligence Fusion Team (RIFT), has revealed that, of the more than 4,400 vulnerabilities that were disclosed* between January and March 2021, 72% had no patches available. Of…