Celebrating our 2024 open-source contributions
Trail of Bits | | Artificial Intelligence, blockchain, Compilers, cryptography, LLVM, machine learning, open source, reversing, supply chain
While Trail of Bits is known for developing security tools like Slither, Medusa, and Fickling, our engineering efforts extend far beyond our own projects. Throughout 2024, our team has been deeply engaged ...
Announcing the 2025 State of Application Risk Report
Use the data and analysis in this report to prioritize your 2025 AppSec efforts ...
Trump U-Turn: TikTok’s On-Again/Off-Again U.S. Ban
Richi Jennings | | Bytedance, children, Children and smartphones, china, chinese government, disinformation, Donald Trump, Misinformation, online disinformation, President Donald Trump, president trump, Privacy, Protecting Americans from Foreign Adversary Controlled Applications Act, SB Blogwatch, Social disinformation, social media, socialmedia, spyware, TikTok, TikTok Ban, Trump, Won’t somebody think of the children?
Not For You: “Protecting Americans from Foreign Adversary Controlled Applications Act” shouldn’t be enforced, orders President Trump ...
Security Boulevard
Bluesky AT Protocol: Building a Decentralized TikTok
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AI-enhanced security, architecture, developers, Development
The Bluesky AT Protocol aims to decentralize social media, empowering users with control over their data and interactions. By shifting power away from centralized platforms like TikTok, it paves the way for ...
The Good, the Bad, and the Politics of Biden’s Cybersecurity Order
Jeffrey Burt | | AI Security, Biden National Cybersecurity Strategy, Donald Trump, foreign threat actors, secure software supply chain
President Biden in the last few days of his administration issued an expansive cybersecurity EO that touched on issues like software supply chain, AI, and foreign adversaries. Many approved of the effort, ...
Security Boulevard
This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump
Richi Jennings | | Biden, Biden administration, Biden National Cybersecurity Strategy, Biden-Harris, china, China-linked Hackers, China-nexus cyber attacks, executive order cybersecurity, executive order on cybersecurity, Federal Government, Joe Biden, Peoples Republic of China, President Biden, president cybersecurity executive order, presidential executive order cybersecurity, SB Blogwatch, US Federal Government, White House, white house executive order cybersecurity framework
Wow. Just Wow: Joseph Robinette Biden Jr. hits the emergency “do something” button ...
Security Boulevard
Allstate Violates Drivers’ Privacy, Texas AG Alleges
Richi Jennings | | Allstate, android spyware, Arity, automaker, Car, cars, cellular IoT, cellular IoT security, Chrysler, Connected Cars, Consumer IoT, Dodge, Fiat, Fuel Rewards, GasBuddy, insurance, Insurance Companies, insurance company, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iOS spyware, iot, Jeep, Lexus, Life360, Maserati, Mazda, Mozilla, Mozilla Foundation, New Cars, Privacy, Privacy4Cars, ram, Routely, SB Blogwatch, spyware, Stellantis, Texas Data Privacy and Security Act, Toyota, vehicle, vehicle cybersecurity, vehicle OTAs
Don’t Mess With Texas Privacy: “We will hold all these companies accountable,” rants state attorney general Ken Paxton (pictured) ...
Security Boulevard
How to Prevent Risk From Unknown Build Assets
Find out why unknown build assets is a growing problem and how Legit can help ...
Tokenization vs Encryption: How to Choose the Best Data Security Approach
As digital systems and data continue to expand in complexity, protecting sensitive information has become crucial—not only to prevent costly breaches but also to meet strict privacy regulations. Two popular methods for ...
Legit Scans for Secrets in ServiceNow ITSM Tickets
Get details on Legit's ability to scan for secrets in ServiceNow tickets ...