Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.trailofbits.com

Trail of Bits Blog

Get the latest updates from Trail of Bits Blog directly as they happen.

Follow now 624 followers

Latest posts

Last updated about 7 hours ago

Don’t recurse on untrusted input

1 day ago

We developed a simple CodeQL query to find denial-of-service (DoS) vulnerabilities in...

The $1.5B Bybit Hack: The Era of Operational Security Failures Has Arrived

1 day ago

The $1.5B Bybit Hack demonstrates how the Era of Operational Security Failures...

Unleashing Medusa: Fast and scalable smart contract fuzzing

8 days ago

Introducing Medusa v1, a cutting-edge fuzzing framework designed to enhance smart contract...

We’re partnering to strengthen TON’s DeFi ecosystem

9 days ago

TVM Ventures has selected Trail of Bits as its preferred security partner...

The call for invariant-driven development

10 days ago

By Josselin Feist Writing smart contracts requires a higher level of security...

The call for invariant-driven development

10 days ago

Writing smart contracts requires a higher level of security assurance than most...

We’re partnering to strengthen TON’s DeFi ecosystem

15 days ago

TON Ventures has selected Trail of Bits as its preferred security partner...

Preventing account takeover on centralized cryptocurrency exchanges in 2025

17 days ago

By Kelly Kaoudis and Evan Sultanik This blog post highlights key points...

Preventing account takeover on centralized cryptocurrency exchanges in 2025

17 days ago

This blog post highlights key points from our new white paper Preventing...

PyPI now supports archiving projects

23 days ago

By Facundo Tuesca PyPI now supports marking projects as archived. Project owners...

PyPI now supports archiving projects

23 days ago

PyPI now supports marking projects as archived. Project owners can now archive...

Best practices for key derivation

25 days ago

By Marc Ilunga Key derivation is essential in many cryptographic applications, including...