Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.trailofbits.com

Trail of Bits Blog

Get the latest updates from Trail of Bits Blog directly as they happen.

Follow now 663 followers

Latest posts

Last updated 7 days ago

Introducing constant-time support for LLVM to protect cryptographic code

7 days ago

Trail of Bits has developed constant-time coding support for LLVM, providing developers...

Constant-time support coming to LLVM: Protecting cryptographic code at the compiler level

14 days ago

Trail of Bits has developed constant-time coding support for LLVM 21, providing...

Constant-time support lands in LLVM: Protecting cryptographic code at the compiler level

14 days ago

Trail of Bits has developed constant-time coding support for LLVM 21, providing...

We found cryptography bugs in the elliptic library using Wycheproof

21 days ago

Trail of Bits is publicly disclosing two vulnerabilities in elliptic, a widely...

Level up your Solidity LLM tooling with Slither-MCP

24 days ago

We’re releasing Slither-MCP, a new tool that augments LLMs with Slither’s unmatched...

How we avoided side-channels in our new post-quantum Go cryptography libraries

25 days ago

The Trail of Bits cryptography team is releasing our open-source pure Go...

Building checksec without boundaries with Checksec Anywhere

26 days ago

Since its original release in 2009, checksec has become widely used in...

Balancer hack analysis and guidance for the DeFi ecosystem

about 1 month ago

TL;DR The root cause of the hack was a rounding direction issue...

The cryptography behind electronic passports

about 1 month ago

Did you know that most modern passports are actually embedded devices containing...

Vulnerabilities in LUKS2 disk encryption for confidential VMs

about 1 month ago

Trail of Bits is disclosing vulnerabilities in eight different confidential computing systems...

Prompt injection to RCE in AI agents

about 2 months ago

We bypassed human approval protections for system command execution in AI agents...

Taming 2,500 compiler warnings with CodeQL, an OpenVPN2 case study

2 months ago

We created a CodeQL query that reduced 2,500+ compiler warnings about implicit...