Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.trailofbits.com

Trail of Bits Blog

Get the latest updates from Trail of Bits Blog directly as they happen.

Follow now 629 followers

Latest posts

Last updated about 10 hours ago

Deceiving users with ANSI terminal codes in MCP

about 10 hours ago

This post describes attacks using ANSI terminal code escape sequences to hide...

How MCP servers can steal your conversation history

6 days ago

This post explains how malicious MCP servers can exploit the Model Context...

Jumping the line: How MCP servers can attack you before you ever use them

8 days ago

This post is about a critical vulnerability in the Model Context Protocol...

Kicking off AIxCC’s Finals with Buttercup

8 days ago

Trail of Bits’ Cyber Reasoning System “Buttercup” is competing in DARPA’s AI...

Sneak peek: A new ASN.1 API for Python

11 days ago

We’re working on integrating an ASN.1 API into PyCA Cryptography built on...

Mitigating ELUSIVE COMET threats: Protecting against Zoom remote control attacks

13 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Neutralizing ELUSIVE COMET Zoom Remote Control Attacks

13 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Mitigating ELUSIVE COMET Zoom remote control attacks

13 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Introducing a new section on snapshot fuzzing for kernel-level testing in the Testing Handbook

20 days ago

Snapshot Fuzzing enables security engineers to effectively test software that is traditionally...

Benchmarking OpenSearch and Elasticsearch

about 2 months ago

This post concludes a four-month performance study of OpenSearch and Elasticsearch search...

Continuous TRAIL

about 2 months ago

You and your team should incrementally update your threat model as your...

Threat modeling the TRAIL of Bits way

2 months ago

In this blog, we’ll talk about our threat modeling process, TRAIL, which...