machine learning

Cybersecurity Insights with Contrast CISO David Lindner | 06/06/25
Insight No. 1 — Fixing threat actor names Microsoft and CrowdStrike announced that they’ll work together on the headache of multiple names for the same threat actors. But what matters most is ...

When AI Fights Back: Threats, Ethics, and Safety Concerns
In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along ...

Signal Gives Microsoft a Clear Signal: Do NOT Recall This
Black screen of DRM: Privacy-first messenger blocks Microsoft Recall ...

Palo Alto Networks to Acquire Protect AI, Launches AI Security Platform
Palo Alto Networks Inc. has agreed to acquire cybersecurity startup Protect AI, and it launched a new AI security platform ...

Anomaly Detection at Scale: Machine Learning Approaches for Enterprise Data Monitoring
Anomaly detection involves methods that assist in identifying data points or occurrences that differ from the anticipated behavior patterns ...

Qevlar Raises $14M to Lead the Agentic AI Revolution
Qevlar leads the agentic AI revolution and raises $14 million in total funding, including a fresh $10 million round led by EQT Ventures and Forgepoint Capital International ...

AIOps Delivers Best Practice Security and Performance to the Network and Business
By implementing an AIOps tool, organizations can adhere to best practices in network management and security, ensuring efficient operations and a robust security posture. ...
AIs as Trusted Third Parties
This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: ...

Single Sign-On (SSO) Differentiation Between Human and Autonomous Non-Human Identities
This in-depth research investigates Single Sign-On (SSO) and its application to both human users and non-human identities. Learn about the necessary differentiations for robust security and effective access management in diverse digital ...
Celebrating our 2024 open-source contributions
While Trail of Bits is known for developing security tools like Slither, Medusa, and Fickling, our engineering efforts extend far beyond our own projects. Throughout 2024, our team has been deeply engaged ...