
NCC Group Research & Technology
@NCCGroupInfosec
Followers
20K
Following
11K
Media
447
Statuses
6K
Technical account for global cyber security & resilience provider, NCC Group. This account is run alongside the @NCCGroupplc corporate account.
Global
Joined April 2011
NCC Group EDG @alexjplaskett and @_mccaulay will present Pioneering Zero Days at Pwn2Own Automotive 2024 where they will describe their Pioneer Pwn2Own chain and demonstrate a proof-of-concept vehicle spyware implant
0
3
16
This Saturday Alex Plaskett (@alexjplaskett) and McCaulay Hudson (@_mccaulay) from NCC EDG will present Revving Up: The Journey to Pwn2Own Automotive 2024 at @cybersaiyanIT in Rome, Italy.
0
1
6
Don't forget tomorrow at 17:00GMT @alexjplaskett and @_mccaulay will present at @44con on Charging Ahead: Exploiting an EV Charger Controller at Pwn2Own 2024!.#Pwn2Own #CyberSecurity #infosec #EVSecurity #VulnerabilityResearch
0
5
8
Our latest research findings and articles are now live on the NCC Group website! Dive into cutting-edge cybersecurity insights here: 🔍. Stay updated by subscribing to our RSS feed: 📡 #Cybersecurity #Research.
2
1
3
Today at 11:20am @alexjplaskett and @robHerrera_ will demonstrate remote compromise of a Sonos device and audio capture implant at @BlackHatEvents. #BHUSA
0
0
5
Don't forget! Tomorrow, on the 8th at 11:20am PST @alexjplaskett and @robHerrera_ present Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap at @BlackHatEvents #BHUSA
0
4
14
Charging Ahead: Exploiting an EV Charger Controller at Pwn2Own 2024 will be presented at 44CON in September by Alex Plaskett (@alexjplaskett) & McCaulay Hudson (@_mccaulay) #44CON #CyberSecurity #InfoSec #EVSecurity #SecurityResearch.
0
1
13
Alex Plaskett (@alexjplaskett) & McCaulay Hudson (@_mccaulay) will be presenting "Revving up: the journey to pwn2own automotive 2024" at RomHack in September #RomHack #CyberSecurity #AutomotiveSecurity #TechTalks #InfoSec #CarHacking #SecurityResearch.
1
1
8
Check out this trick that allows you to run binaries on embedded Linux without crosscompiling #security #cybersecurity #infosec #linux.
0
2
28
Cryptopals Guided Tour Episode 17 just went live (!!) .#infosec #cybersecurity #cryptopals #learning #cyrptography #ohhnoithasmath.
0
0
3
Do you want to learn more about Windows Exploit Engineering? @saidelike will be performing in-person training in Paris at @hexacon_fr on the 30th Sept-3rd of Oct
0
4
10
Listen up! @alexjplaskett and @robHerrera_ will present Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap at BlackHat USA 2024 @BlackHatEvents They will demonstrate remote compromise and microphone capture! #BHUSA.
0
2
13
Checkout the new NanoMIPS plugin/blog post that aided in reverse engineering a Mediatek-based 5G modem image! #cybersecurity #infosec #tech.
2
7
21
Have you ever heard that 1 + 1 does not always equal 2? That's the case with prompt injection. In this post, @JoseSelvi describes the non-deterministic nature of prompt injection and how to avoid missdetecting such vulnerability.
1
4
8
An update (1.5.1) has been released for Phoenix Contact CHARX SEC-3100 EV Charging Controllers which addresses vulnerabilities NCC Group EDG (@alexjplaskett @_mccaulay) exploited at Pwn2Own Automotive 2014.
1
2
4
Mark Tedman introduces a Telco Attack Testing Tool designed to enhance security testing methodologies within the telecommunications industry. #CyberSecurity #Telecommunications #InfoSec #NetworkSecurity.
1
0
7
A race in time to find a replacement bug for Pwn2Own Toronto 2022!. EDG (@_mccaulay @alexjplaskett @saidelike @FidgetingBits) found and exploited another Netgear WAN command injection bug. Blog:
1
8
19
Yes! EDG are too awesome - well done team! #Pwn2Own.
Too awesome! Not only did NCC Group EDG (@nccgroupinfosec, @_mccaulay, and @alexjplaskett) exploit the #Alpine IVI, they loaded a playable version of Doom! Off to the disclosure room (after a few levels).
0
0
13
RT @thezdi: Success! The folks from NCC Group EDG (@nccgroupinfosec, @_mccaulay, and @alexjplaskett) were able to exploit the Phoenix Conta….
0
12
0