The Trail of Bits mascot, an octopus, wears a detective's fedora and examines a trail of bits (0s and 1s) through a magnifying glass.

A trail of flipping bits

| | attacks, cryptography
By Joop van de Pol Trusted execution environments (TEE) such as secure enclaves are becoming more popular to secure assets in the cloud. Their promise is enticing because when enclaves are properly ...
geenrative AI, data security, AI, data security, AI-driven

Emerging Technologies, Evolving Threats: Strategies for Future-Proofing Data Security

With AI's ability to learn from data and continuously refine its tactics, cybercriminals can create more sophisticated, elusive and difficult-to-detect malware ...
Security Boulevard

Security flaws in an SSO plugin for Caddy

By Maciej Domanski, Travis Peters, and David Pokora We identified 10 security vulnerabilities within the caddy-security plugin for the Caddy web server that could enable a variety of high-severity attacks in web ...
Most Common Injection Attacks

How Injection Attacks Can Cripple Your Business?

Injection attacks distinguish themselves among these threats as devastating exploitation. Businesses face a variety of cyber risks in today’s interconnected digital environment that might jeopardize their operations. This also compromises sensitive data ...
Mobile App Testing: Top-notch Security

Mobile App Testing: Top-notch Security

Introduction Our daily lives have become completely dependent on mobile applications. To ensure secure mobile app testing, top-notch security is necessary. This makes a variety of chores easier and is always at ...
Cyber Attack Due to Malicious Open-source Package

Cyber Attack Due to Malicious Open-source Package

Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by developers to speed up the development process and reduce the amount of ...
Elevate Your Cybersecurity: Unleashing the Power of Top Frameworks to Safeguard Your Digital Assets

Elevate Your Cybersecurity: Unleashing the Power of Top Frameworks to Safeguard Your Digital Assets

Protecting your digital assets has become a top priority due to society’s growing reliance on technology. Protecting sensitive data, preventing data breaches, and preserving the privacy and integrity of digital assets all ...

Readline crime: exploiting a SUID logic bug

| | attacks, Exploits, Linux
By roddux // Rory M I discovered a logic bug in the readline dependency partially reveals file information when parsing the file specified in the INPUTRC environment variable. This could allow attackers ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

Securing Against Supply Chain Attacks

Anyone who has been in IT for the last decade knows the risks posed by ransomware and cyberattacks. They have been on our radar as a top concern for many years. But ...
Security Boulevard
information cybercriminals EO nation-state Developing Nations Cybercrime

How Cybercrime Evolved Into a Business

When many people think of a cyberattacker, they think of an individual trying to make money or cause harm. But in reality, attackers today are often part of an organized matrix that ...
Security Boulevard