NCC Group North America InfoSec
@NCCsecurityUS
Followers
6K
Following
606
Media
785
Statuses
2K
NCC Group North America security consulting. Find our Corporate Global Account here: @NCCGroupPLC and our everything tech account here: @NCCGroupInfosec
United States
Joined June 2008
π¨ New Blog Alert! π¨ "PMKID Attacks: Debunking the 802.11r Myth" Uncover the truth about PMKID-based attacks and learn how to protect your Wi-Fi network. Read more: https://t.co/jWMlKRUMGE
#CyberSecurity #WiFiSecurity #TechInsights
0
1
3
New Blog Alert! Dive into the details of a recent business email compromise handled by NCC Groupβs DFIR team. Read more: https://t.co/CH16vkAayN
#CyberSecurity #Phishing #NCCGroup
0
1
2
π New Report Available! Ephemera engaged NCC Group to review their Rust implementation of XMTP, built on Messaging Layer Security (MLS) for Web3. Discover the findings and insights from our security assessment. Download now! https://t.co/sUh3im8f1U
#CyberSecurity
0
1
5
New Blog Alert! Dive into the world of secure AI with our latest article on architectural principles that mitigate severe vulnerabilities in AI-integrated applications. Stay ahead in the game of security! π‘οΈ Read more: https://t.co/cBdkdVYGtp
#AI #CyberSecurity #NCCGroup
0
0
5
π¨ New Blog Alert! π¨ Discover how signing Android builds with known private keys can leave devices vulnerable, even with secure boot enabled. #CyberSecurity #Android #NCCGroup Read more: https://t.co/9Cg9JlS3gy
0
1
2
New blog out now: π Defend Your Directory! Dive into our expert guide on mitigating Pass-the-Hash attacks in Active Directory. Protect your networkβs trust from counterfeiters! π Read more: https://t.co/mXnoNmvH8M
#CyberSecurity #ActiveDirectory #ITSecurity
0
2
5
Nameless and Shameless: Uncover the dark side of ransomware encryption via BitLocker. Learn how to protect your data from these stealthy threats! π‘οΈπ Read more here: https://t.co/VPWPDv4hir
#CyberSecurity #Ransomware #BitLocker #DataProtection
0
1
0
π¨ Protect Your Active Directory! π¨ Discover expert strategies to combat Kerberoasting and secure your network. Donβt miss out on this essential guide! ππ Read more here: https://t.co/gUr3w3rj4D
#CyberSecurity #ActiveDirectory #Kerberoasting #ITSecurity
0
0
0
New Blog: Announcing the Cryptopals Guided Tour Video 18: Implement CTR By Eli Sohl https://t.co/Wnsqz6o1dI
0
1
0
New Blog: Comparing AI Against Traditional Static Analysis Tools to Highlight Buffer Overflows By Mark Tedman https://t.co/RC67yY00aG
0
9
16
New Blog: RomHack β Revving Up: The Journey to Pwn2Own Automotive 2024 by McCaulay Hudson @_mccaulay and Alex Plaskett @alexjplaskett presented at RomHack Rome https://t.co/Rf72kb5t7z
0
7
20
New Blog: 44CON - Charging Ahead: Exploiting an EV Charger Controller at Pwn2Own Automotive 2024 By McCaulay Hudson @_mccaulay and Alex Plaskett @alexjplaskett presented at @44CON London https://t.co/35YUD0yV9T
0
3
8
New Blog: Forensic Readiness in Container Environments by Rafael Alfaro March https://t.co/BYGUhQniFz
0
2
1
New Blog: Technical Advisory: Xiaomi 13 Pro Code Execution via GetApps DOM Cross-Site Scripting (XSS) by Ken Gannon @Yogehi
https://t.co/7IeILeHZn9
1
21
64
New Blog: The Dark Side: How Threat Actors Leverage @anydesk for Malicious Activities https://t.co/e9qjBu12AH
0
1
0
New Blog: Listen-Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap @robHerrera_ and @alexjplaskett presented this talk to a packed briefing room at #blackhat2024. Don't miss the slides, whitepaper and video here: https://t.co/aRONTMlJqq
0
1
10
New Blog: Public Report - Security Risks of AI Hardware for Personal and Edge Computing Devices https://t.co/ziaCImBBCG
0
1
3