Total results: 2473
Page 1 of 99
Filters
Topics
- Cyber Security (461)
- Research (410)
- Consulting (402)
- Technology, general (395)
- Whitepapers (238)
- Computer security (230)
- Technical advisories (224)
- Vulnerability (173)
- Cryptography (126)
- Tool Release (115)
- Hardware & Embedded Systems (113)
- Public tools (107)
- Threat Intelligence (107)
- General Consulting (94)
- Technology (85)
- Public Reports (66)
- Insights & Viewpoints (64)
- Digital Forensics and Incident Response (DFIR) (62)
- Presentations (56)
- Increasing regulatory & legislative requirements (53)
- iSec Partners (52)
- Reverse Engineering (50)
- Tutorial/Study Guide (50)
- Assessments (49)
- Growing threat landscape (45)
- Regulations & Legislation (42)
- Conferences (40)
- Machine Learning (40)
- Cloud Security (39)
- Cloud & Containerization (37)
- Securing our connected future (36)
- Patch notifications (35)
- VSR (32)
- Insight Space (28)
- North American Research (28)
- Uncategorized (28)
- Working life (26)
- Offensive Security & Artificial Intelligence (25)
- UK (24)
- Managed Detection & Response (22)
- Ransomware (22)
- Reducing Vulnerabilities at Scale (22)
- Research Paper (22)
- Transport (20)
- Fox-IT (19)
- Sustainability (18)
- Books (17)
- Detection and Threat Hunting (17)
- Standards (15)
- Third-Party Risk Management (14)
- Emerging Technologies (13)
- Vulnerability Research (13)
- Gender (12)
- Managed Detection & Response (MDR) (12)
- Public interest technology (12)
- Virtualization, Emulation, & Containerization (11)
- 5G Security & Smart Environments (10)
- Artificial Intelligence (10)
- Gaming & Media (10)
- Inclusion and Diversity (10)
- NCC Conversations (10)
- Operational Technology (10)
- Social issues (10)
- UK Research (10)
- #eachforequal (9)
- Blockchain (9)
- Business Insights (9)
- Finance (9)
- Giving Back (9)
- Politics (9)
- Talent and Careers (9)
- Risk Management & Governance (8)
- Corporate (7)
- Cyber as a Science (7)
- Fox-IT and European Research (7)
- General (7)
- Remediation (7)
- Supply Chain Management (7)
- Working Environment (7)
- Crises, Incident (6)
- Data, Telecom, IT (6)
- Engineering (6)
- Health, Health Care, Pharmaceuticals (6)
- Security (6)
- #People - making the world safer and more secure (5)
- Crime (5)
- Government (5)
- MXDR (5)
- Partnerships, cooperations (5)
- Telecom (5)
- Annual Research Report (4)
- Awards (4)
- Awards & Recognition (4)
- General data (4)
- IT Consulting (4)
- Law (4)
- Mental Health (4)
- Reports (4)
- Science, technology (4)
- Threat briefs (4)
- APAC (3)
- Academic Partnership (3)
- Business enterprise (3)
- CYBERUK (3)
- Cars and traffic (3)
- Children, Youth (3)
- Corona (3)
- Data (3)
- Gender equality (3)
- Legacy Systems (3)
- People (3)
- School (3)
- Software Resilience (3)
- Technology Policy (3)
- UK cyber security policy (3)
- USA (3)
- Crime, Law, Legal affairs (2)
- Crises (2)
- Crypto (2)
- DDoS Assured (2)
- Education (2)
- Expert Insights (2)
- Incident Response (2)
- Intern Projects (2)
- Legal affairs (2)
- Microsoft (2)
- Misinformation, Deepfakes, & Synthetic Media (2)
- PCI DSS (2)
- Politics, general (2)
- Public sector (2)
- Resources (2)
- Smart cities (2)
- Social issues, General (2)
- Sustainability/CSR (2)
- Teaching, Learning (2)
- University, University College (2)
- Webinar (2)
- escrow (2)
- future of cyber (2)
- (1)
- ADD (1)
- ADHD (1)
- Adult education (1)
- Alumni Network (1)
- Annual and interim reports (1)
- Asia Pacific Research (1)
- Business enterprise, General (1)
- CTFs/Microcorruption (1)
- Communication (1)
- Current events (1)
- Cyber Advice (1)
- Cyber Talent Development (1)
- Defence issues (1)
- Disclosure Policy (1)
- Economy (1)
- Economy, Finance (1)
- Educational sciences (1)
- Elections (1)
- Energy (1)
- Energy issues (1)
- Finance and Professional Services (1)
- Fintech (1)
- Fraud (1)
- Industry, manufacturing (1)
- Infrastructure (1)
- Investor Relations (1)
- IoT (1)
- LGBTQIA+ (1)
- Law, Justice (1)
- MDR (1)
- MISA (1)
- MVSS (1)
- Managed Detection and Response (1)
- Mental Wellbeing (1)
- Parliament (1)
- Petroleum, Oil, Gas (1)
- Pride (1)
- Radio, TV (1)
- Science, general (1)
- Secure Development Lifecycle (SDL) (1)
- Sentinel (1)
- Services, Consulting (1)
- Society (1)
- Solutions (1)
- Spa, fitness, well-being (1)
- Supply Chain (1)
- Telecommunication, mobile telephony (1)
- Training (1)
- Web services (1)
- collaboration (1)
- computer misuse act (1)
- critical national infrastructure (1)
- cyber resilience (1)
- deepfake (1)
- healthcare (1)
- hospital (1)
- legal (1)
- next generation talent (1)
- protocol_name (1)
- recruitment (1)
- remediate (1)
- remediation (1)
- remote working (1)
- security consultant (1)
- smart tvs (1)
- threatintel (1)
Sectors
- Research (1324)
- News (419)
- Article (259)
- Press Release (113)
- Case Studies (47)
- Transport (22)
- Financial Services (21)
- Public Sector & Government Services (17)
- Tech, Media & Telecoms (15)
- Whitepapers (15)
- Cyber Advice & Insights (13)
- Events (9)
- Healthcare (9)
- Energy & Utilities (7)
- Videos (7)
- Guides & Datasheets (6)
- Retail & Consumer Markets (6)
- Webinars (6)
- Education (5)
- Maritime (5)
- Aviation & Aerospace (4)
- Manufacturing (4)
- (3)
- Software Vendors (3)
- Legal & Professional Services (2)
- Commodities (1)
- Infographics (1)
- Software Resilience (1)
Public Report: Google Private AI Compute Review
Starting in the spring of 2025, Google engaged NCC Group to conduct a series of reviews involving selected aspects of their Private AI Compute in the cloud system. The purpose of the Private AI Compute system is to extend the AI capabilities of a mobile device with more powerful cloud computing res…
NCC Group wins Enterprise Consultancy of the Year at the National Cyber Awards 2025
NCC Group has been named Enterprise Consultancy of the Year at the National Cyber Awards 2025. This prestigious recognition marks a proud moment for our global team, celebrating our unwavering commitment to building a safer digital future through expert consultancy, innovation, and collaboration. It…
Microsoft announces the WMIC command is being retired, Long Live PowerShell
Research Detection and Threat Hunting Digital Forensics and Incident Response (DFIR) Category: Detection and Threat Hunting What is WMIC? The Windows Management Instrumentation (WMI) Command-Line Utility (WMIC) is a command-line utility that allows users to perform WMI operations from a command pro…
Impress Pages CMS Remote Code Execution
Research Cyber Security Patch notifications This patch notification details a high risk vulnerability, discovered by David Middlehurst, in ImpressPages CMS v1.0.12. Download patch notification NCC Group Publication Archive
A Census of Deployed Pulse Connect Secure (PCS) Versions
Research Threat Intelligence Today we are releasing some statistics around deployment of Pulse Connect Secure versions in the wild. The hope is that by releasing these statistics we can help to highlight the risk around outdated versions of PCS, which are being actively exploited by malicious actors…
Global Cyber Policy Radar
Exclusive insights into the latest global cyber security laws and regulations. NCC Group's Global Cyber Policy Radar looks to the big developments on the horizon. The report Renowned as trusted advisors to governments and legislators worldwide, NCC Group's experts play an instrumental role in shapin…
An Introduction to Authenticated Encryption
Research Cryptography Whitepapers Authored by: Shawn Fitzgerald Download whitepaper NCC Group Publication Archive
NCLoader
Research Public tools enced by a constant “2131099692”, which cannot be dereferenced and this is where apktool is very helpful. Before we get into apktool, we will try to understand what is being passed. getAction() will get whatever was set using setAction() in the MainActivity class. putExtra() se…
Public Report – Zcash NU5 Cryptography Review
Research Cryptography Public Reports In March 2021, Electric Coin Co. engaged NCC Group to perform a review of the upcoming network protocol upgrade NU5 to the Zcash protocol (codenamed “Orchard”). The review was to be performed over multiple phases: first, the specification document changes and the…
SecureCookies
Research Public tools SecureCookies is a tool to evaluate whether a given URL is utilizing the security options in the cookie. Prerequisites: Win32 Download Tool NCC Group Publication Archive
NCC Group Monthly Threat Pulse – August 2022
News Technology, general Consulting Computer security Growing threat landscape Lockbit 3.0 (64 victims) most active attacker, followed by BlackBasta (18 victims) New threat actor IceFire emerges, with 10 victims Industrials (34%), Consumer Cyclicals (18%) Technology (14%) remain most targeted sector…
NCC Group Monthly Threat Pulse – March 2023
News Technology, general Consulting Computer security Growing threat landscape Ransomware victims at all-time high, with 91% increase in March March saw an unprecedented surge in ransomware attacks with 459 recorded, a 91% increase from February 2023. Cl0p claimed the most active threat actor, with…
Game Security
Research Research Gaming & Media This blog post provides an overview of cheating and anti-cheat methods in electronic games. NCC Group has previously looked at cheating, and found ways to bypass anti-cheat, but this is more of an overview. It doesn’t contain details on particular games or companies.…
How secure is your business?
In today’s threat landscape, understanding the risks your organization and customers are exposed to is more important than ever. Take the first step to bolster your defenses and raise your security maturity to the next level. We help you identify security gaps and develop a comprehensive security pl…
Check out our new Microcorruption challenges!
Research Research Hardware & Embedded Systems Tool Release CTFs/Microcorruption New Microcorruption challenges created by Nick Galloway and Davee Morgan Today we are releasing several new challenges for the embedded security CTF, Microcorruption. These challenges highlight types of vulnerabilities t…
NCC Group Monthly Threat Pulse
News Technology, general Consulting Computer security Growing threat landscape December saw 269 ransomware attacks, a small increase (2%) from November (265) Lockbit 3.0 reclaims first place as most active attacker with 56 attacks (19%) Industrials (25%) and Consumer Cyclicals (20%) remain top most…
SecureIE.ActiveX
Research Public tools SecureIE.ActiveX is a tool to evaluate the ActiveX security settings on Internet Explorer. Prerequisites: Win32 Download Tool NCC Group Publication Archive
WSSiP: A Websocket Manipulation Proxy
Research Public tools WSSiP is a tool for viewing, interacting with, and manipulating WebSocket messages between a browser and web server. WebSockets themselves are a newer option for client-side JavaScript code that allows browsers to connect to the web server in order to signify that the connectio…
Setting a New Standard for Kubernetes Deployments
Research Cloud & Containerization The Center for Internet Security (CIS) has recently released a new benchmark standard for Kubernetes deployments, providing a vendor-neutral benchmark to help companies assess against good security practices. Kubernetes is a key player in the containerisation techno…
Pip3line – The Swiss Army Knife of Byte Manipulation
Research Tool Release Here at NCC Group we work with raw bytes a lot! As I couldn’t find a good tool to manipulate, encode and decode easily I set about writing Pip3line a while back. While it has been available for a while as open source I’ve not really discussed it outside of NCC hence this post.…
Post
Research Uncategorized Kubernetes is essentially a framework of various services that make up its typical architecture, which can be divided into two roles: the control-plane, which serves as a central control hub and hosts most of the components, and the nodes or workers, where containers and their…
Technical Advisory – ICTFAX 7
Research Technical advisories Vendor: ICTFAX Vendor URL: https://www.ictfax.org Versions affected: ICTFax Version 4.0.2 Author: Derek Stoeckenius Summary ICTFax is fax to email software maintained by ICTInnovations. In version 7-4 of this product, available through the CentOS software repository, an…
The Update Framework (TUF) Security Assessment
Research Hardware & Embedded Systems Public Reports Transport NCC Group consultants Mason Hemmel and Jeff Dileo recently completed a one-week audit of the Kolide TUF client. The audit took place between August 28, 2017 and September 1, 2017. TUF, an acronym for The Update Framework, is a set-and-for…
NCC Group hosts UK’s Lord Mayor of London on virtual tour
News Technology, general Consulting As part of a FinTech-focused virtual tour of the North West of England to strengthen ties with the region, the Rt Hon Lord Mayor of London, William Russell, visited NCC Group’s Manchester office on 26 October. Hosted by Adrian Ah-Chin-Kow, managing director of UK…
NCC Group supports new cyber funding scheme to futureproof “the integrity of Scottish organisations”
News Technology, general Consulting Sustainability Insights & Viewpoints NCC Group is a named Trusted Partner to Police Scotland for delivery of Cyber Essentials certification, and is delighted to promote a new Cyber Essentials voucher scheme offered by the Scottish government, which will help to bo…