Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.trailofbits.com

Trail of Bits Blog

Get the latest updates from Trail of Bits Blog directly as they happen.

Follow now 630 followers

Latest posts

Last updated 4 days ago

Datasig: Fingerprinting AI/ML datasets to stop data-borne attacks

4 days ago

Datasig generates compact, unique fingerprints for AI/ML datasets that let you compare...

Making PyPI's test suite 81% faster

5 days ago

See how we slashed PyPI’s test suite runtime from 163 to 30...

Insecure credential storage plagues MCP

6 days ago

This post describes how many examples of MCP software store long-term API...

Deceiving users with ANSI terminal codes in MCP

7 days ago

This post describes attacks using ANSI terminal code escape sequences to hide...

How MCP servers can steal your conversation history

13 days ago

This post explains how malicious MCP servers can exploit the Model Context...

Jumping the line: How MCP servers can attack you before you ever use them

15 days ago

This post is about a critical vulnerability in the Model Context Protocol...

Kicking off AIxCC’s Finals with Buttercup

15 days ago

Trail of Bits’ Cyber Reasoning System “Buttercup” is competing in DARPA’s AI...

Sneak peek: A new ASN.1 API for Python

18 days ago

We’re working on integrating an ASN.1 API into PyCA Cryptography built on...

Mitigating ELUSIVE COMET threats: Protecting against Zoom remote control attacks

19 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Neutralizing ELUSIVE COMET Zoom Remote Control Attacks

19 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Mitigating ELUSIVE COMET Zoom remote control attacks

19 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Introducing a new section on snapshot fuzzing for kernel-level testing in the Testing Handbook

27 days ago

Snapshot Fuzzing enables security engineers to effectively test software that is traditionally...