Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

NCC Group

Below you will find reports with the source of “NCC Group”

image from ZCash Ceremony And Audit

ZCash Ceremony And Audit

This report is based on a security audit of the opening ceremony of ZCash.
Added: October 24, 2018
image from Understanding The Insider Threat And How To Mitigate It

Understanding The Insider Threat And How To Mitigate It

This paper is intended to give a high-level view on the insider threat for those looking to implement a defensive programme. (more available)
Added: October 23, 2018
image from Understanding Cyber RIsk Management vs Uncertainty With Confidence

Understanding Cyber RIsk Management vs Uncertainty With Confidence

This white paper provides an analysis of Risk Management and overcoming uncertainty.
Added: October 22, 2018
image from TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

This report provides an analysis of TPM Genie. TPM Genie is a serial bus interposer which has been designed to aid in the security research of Trusted Platform Module hardware. (more available)
Added: October 21, 2018
image from The Economics Of Defense Security

The Economics Of Defense Security

This is a useful article that takes a look at the financial numbers of paying for a defensive strategy vs. paying for a breach. (more available)
Added: October 20, 2018
image from Open Banking Security Considerations And Potential Risks

Open Banking Security Considerations And Potential Risks

This report takes a good look at Open Banking, it defines what it is, and considers the security implications for using it. (more available)
Added: October 19, 2018
image from Network Attached Security Attacking A Synology NAS

Network Attached Security Attacking A Synology NAS

Network-Attached Storage (NAS) devices are a popular way for people to store and share their photos, videos and documents. Securing these devices is essential as they can contain sensitive information and are often exposed to the Internet. (more available)
Added: October 18, 2018
image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.
Added: October 17, 2018
image from The Update Framework Security Assessment

The Update Framework Security Assessment

During the summer of 2017, a study was done on the security issues related to the TUF framework.
Added: October 16, 2018
image from Cross-Protocol Request Forgery

Cross-Protocol Request Forgery

This whitepaper formalizes a class of attacks called Cross-Protocol Request Forgery (CPRF) which enables non-HTTP listeners to be exploited through Cross-Site Request Forgery (CSRF) and Server-Side Request Forgery (SSRF). (more available)
Added: October 15, 2018
image from CakePHP Security Assessment

CakePHP Security Assessment

This report is based on a study done in 2017 to analyze security issues in CakePHP.
Added: October 14, 2018
© Cyentia Institute 2022
Library updated: July 1, 2022 04:08 UTC (build d6199b1)