
NCC Group Research & Technology
@nccgroupinfosec
Technical account for global cyber security & resilience provider, NCC Group. This account is run alongside the @NCCGroupplc corporate account.
ID: 283928662
https://research.nccgroup.com 18-04-2011 08:52:36
6,6K Tweet
19,19K Followers
2,2K Following

Success! The folks from NCC Group EDG (NCC Group Research & Technology, McCaulay, and Alex Plaskett) were able to exploit the Phoenix Contact CHARX SEC-3100 and provided a light show as confirmation. #Pwn2Own #P2OAuto


A race in time to find a replacement bug for Pwn2Own Toronto 2022! EDG (McCaulay Alex Plaskett Cedric Halbronn fidgeting bits) found and exploited another Netgear WAN command injection bug. Blog: research.nccgroup.com/2024/02/09/puc…




Have you ever heard that 1 + 1 does not always equal 2? That's the case with prompt injection. In this post, Jose Selvi describes the non-deterministic nature of prompt injection and how to avoid missdetecting such vulnerability. research.nccgroup.com/2024/04/12/non…


Listen up! Alex Plaskett and Robert Herrera will present Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap at BlackHat USA 2024 Black Hat They will demonstrate remote compromise and microphone capture! #BHUSA blackhat.com/us-24/briefing…






Don't forget! Tomorrow, on the 8th at 11:20am PST Alex Plaskett and Robert Herrera present Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap at Black Hat #BHUSA


Today at 11:20am Alex Plaskett and Robert Herrera will demonstrate remote compromise of a Sonos device and audio capture implant at Black Hat. #BHUSA




This Saturday Alex Plaskett (Alex Plaskett) and McCaulay Hudson (McCaulay) from NCC EDG will present Revving Up: The Journey to Pwn2Own Automotive 2024 at Cyber Saiyan | RomHack Conference, Training, Camp in Rome, Italy.

