1. Image for Research Insights Volume 3 - How are we breaking in: Mobile Security

    Research Insights Volume 3 - How are we breaking in: Mobile Security

    The proliferation of the personal and business use of mobile devices has created a strong demand for mobile security assurance. Mobile apps and devices can suffer from many of the same vulnerabilit...

    View White Paper
  2. Image for Poster: Warning Against Phishing

    Poster: Warning Against Phishing

    Warning against phishing poster. A look at the dangers of phishing, how it happens, what to look out for and how to protect yourself.

    View Media
  3. Image for Website Performance Optimisation Infographic

    Website Performance Optimisation Infographic

    This infographic will demonstrate the importance of website performance optimisation with examples from some of the world’s most well-known sites, that a small change in website performance can have a huge impact on your business.

    View Media
  4. Image for Adobe Flash Player Cross Domain Policy Bypass

    Adobe Flash Player Cross Domain Policy Bypass

    Adobe Flash Player Cross Domain Policy Bypass

    View Resource
  5. Image for Flash security restrictions bypass: File upload by URLRequest

    Flash security restrictions bypass: File upload by URLRequest

    Flash security restrictions bypass: File upload by URLRequest

    View Resource
  6. Image for Multiple Vulnerabilities in MailEnable

    Multiple Vulnerabilities in MailEnable

    Multiple Vulnerabilities in MailEnable

    View Resource
  7. Image for NCC Group Malware Technical Note

    NCC Group Malware Technical Note

    NCC Group’s Cyber Defence Operations team has released a technical note about the Derusbi Server variant, which we encountered on an engagement at the end of last year.

    View Resource
  8. Image for Xen HYPERVISOR_xen_version stack memory revelation

    Xen HYPERVISOR_xen_version stack memory revelation

    Vulnerability Summary Title: Xen HYPERVISOR_xen_version stack memory revelationRelease Date: 6 March 2015Reference: NCC00817Discoverer: Aaron AdamsVendor: XenVendor Reference: XSA-122Systems Affec...

    View Resource
  9. Image for Cups-filters remote code execution

    Cups-filters remote code execution

    VULNERABILITY SUMMARY Title: cups-filters remote code executionRelease Date: 6 March 2015Reference: NCC00816Discoverer: Paul CollettVendor: Linux FoundationSystems Affected: All LinuxCVE Reference...

    View Resource
  10. Image for SmarterMail - Stored XSS in emails

    SmarterMail - Stored XSS in emails

    VULNERABILITY SUMMARY Title: SmarterMail - Stored XSS in emailsRelease: Date 6 March 2015Reference: NCC00776Discoverer: Soroush DaliliVendor: Smarter ToolsSystems Affected: v13.1.5451 and priorCVE...

    View Resource