Sponsor of the Day:
Jerkmate
https://blog.trailofbits.com/categories/events/
events - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogeventstrail
https://blog.trailofbits.com/2022/
2022 - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blog2022trail
https://blog.trailofbits.com/categories/snapshot-fuzzing/
snapshot fuzzing - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogsnapshotfuzzingtrail
https://blog.trailofbits.com/categories/sponsorships/
sponsorships - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogsponsorshipstrail
https://blog.trailofbits.com/categories/podcast/
podcast - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogpodcasttrail
https://blog.trailofbits.com/2026/02/25/mquire-linux-memory-forensics-without-external-dependencies/
mquire: Linux memory forensics without external dependencies - The Trail of Bits Blog
Feb 25, 2026 - We’re open-sourcing mquire, a tool that analyzes Linux memory dumps without requiring any external debug information.
linux memoryexternal dependenciesbits blogforensicswithout
https://blog.trailofbits.com/2025/12/16/use-gwp-asan-to-detect-exploits-in-production-environments/
Use GWP-ASan to detect exploits in production environments - The Trail of Bits Blog
Dec 16, 2025 - GWP-ASan is a sampling-based memory error detection tool that catches critical bugs like use-after-free and buffer overflows in production environments with...
production environmentsbits blogusegwpasan
https://bits.ashleyblewer.com/blog/2024/03/22/researching-file-formats-30-autodesk-maya-binary/
Researching file formats 30: Autodesk Maya Binary · BITS BLOG ✴ Ashley Blewer
file formatsautodesk mayabits blogashley blewerresearching
https://blog.trailofbits.com/2023/12/14/darpas-ai-cyber-challenge-were-in/
DARPA’s AI Cyber Challenge: We’re In! - The Trail of Bits Blog
Dec 14, 2023 - We’re thrilled to announce that Trail of Bits will be competing in DARPA’s upcoming AI Cyber Challenge (AIxCC)! DARPA is challenging competitors to develop...
ai cyberbits blogchallengetrail
https://blog.trailofbits.com/categories/application-security/
application-security - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
application securitybits blogtrail
https://bits.ashleyblewer.com/blog/2024/03/15/researching-file-formats-29-autodesk-maya-project/
Researching file formats 29: Autodesk Maya Project · BITS BLOG ✴ Ashley Blewer
file formatsautodesk mayabits blogashley blewerresearching
https://blog.trailofbits.com/2022/11/08/sigstore-code-signing-verification-software-supply-chain/
We sign code now - The Trail of Bits Blog
Nov 8, 2022 - Sigstore announced the general availability of its free and ecosystem-agnostic software signing service two weeks ago, giving developers a way to sign, verify...
bits blogsigncodetrail
https://blog.trailofbits.com/2020/
2020 - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blog2020trail
https://blog.trailofbits.com/categories/tool-release/
tool-release - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogtoolreleasetrail
https://blog.trailofbits.com/2023/11/14/our-audit-of-pypi/
Our audit of PyPI - The Trail of Bits Blog
Nov 14, 2023 - This is a joint post with the PyPI maintainers; read their announcement here! This audit was sponsored by the Open Tech Fund as part of their larger mission to...
bits blogauditpypitrail
https://blog.trailofbits.com/categories/manticore/
manticore - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogmanticoretrail
https://blog.trailofbits.com/categories/java/
java - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogjavatrail
https://blog.trailofbits.com/2018/09/26/effortless-security-feature-detection-with-winchecksec/
Effortless security feature detection with Winchecksec - The Trail of Bits Blog
Sep 26, 2018 - We’re proud to announce the release of Winchecksec, a new open-source tool that detects security features in Windows binaries. Developed to satisfy our...
security featurebits blogeffortlessdetectiontrail
https://blog.trailofbits.com/categories/mcsema/
mcsema - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogtrail
https://blog.trailofbits.com/categories/vulnerabilities/
vulnerabilities - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogvulnerabilitiestrail
https://blog.trailofbits.com/categories/mutation-testing/
mutation-testing - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
mutation testingbits blogtrail
https://blog.trailofbits.com/categories/post-quantum/
post-quantum - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
post quantumbits blogtrail
https://blog.trailofbits.com/2024/03/01/when-try-try-try-again-leads-to-out-of-order-execution-bugs/
When try, try, try again leads to out-of-order execution bugs - The Trail of Bits Blog
Mar 1, 2024 - Have you ever wondered how a rollup and its base chain—the chain that the rollup commits state checkpoints to—communicate and interact? How can a user with...
order executionbits blogtryleadsbugs
https://blog.trailofbits.com/categories/windows/
windows - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogwindowstrail
https://blog.trailofbits.com/categories/remote-code-execution/
remote-code-execution - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
remote code executionbits blogtrail
https://blog.trailofbits.com/categories/paper-review/
paper-review - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
paper reviewbits blogtrail
https://blog.trailofbits.com/2026/04/03/simplifying-mba-obfuscation-with-cobra/
Simplifying MBA obfuscation with CoBRA - The Trail of Bits Blog
Apr 3, 2026 - We’re releasing CoBRA, an open-source tool that simplifies the full range of Mixed Boolean-Arithmetic (MBA) expressions used in the wild.
bits blogsimplifyingmbaobfuscationcobra
https://blog.trailofbits.com/categories/artificial-intelligence/
artificial-intelligence - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
artificial intelligencebits blogtrail
https://blog.trailofbits.com/categories/empire-hacking/
empire-hacking - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogempirehackingtrail
https://blog.trailofbits.com/categories/vulnerability-disclosure/
vulnerability-disclosure - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
vulnerability disclosurebits blogtrail
https://blog.trailofbits.com/categories/kubernetes/
kubernetes - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogkubernetestrail
https://blog.trailofbits.com/categories/containers/
containers - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogcontainerstrail
https://blog.trailofbits.com/categories/engineering-practice/
engineering-practice - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
engineering practicebits blogtrail
https://blog.trailofbits.com/authors/mike-myers/
Mike Myers - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
mike myersbits blogtrail
https://blog.trailofbits.com/categories/conferences/
conferences - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogconferencestrail
https://bits.ashleyblewer.com/
BITS BLOG ✴ Ashley Blewer ·
bits blogashley blewer
https://blog.trailofbits.com/2026/03/25/try-our-new-dimensional-analysis-claude-plugin/
Try our new dimensional analysis Claude plugin - The Trail of Bits Blog
Mar 25, 2026 - We released a Claude plugin that uses LLMs to annotate code with dimensional types and mechanically detect mismatches, achieving 93% recall versus 50% for...
dimensional analysisclaude pluginbits blogtrynew
https://blog.trailofbits.com/2026/04/01/mutation-testing-for-the-agentic-era/
Mutation testing for the agentic era - The Trail of Bits Blog
Apr 1, 2026 - Today, we’re announcing MuTON and mewt, two new mutation testing tools optimized for agentic use.
mutation testingagentic erabits blogtrail
https://blog.trailofbits.com/categories/threshold-signatures/
threshold-signatures - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogthresholdsignaturestrail
https://blog.trailofbits.com/2024/04/30/curvance-invariants-unleashed/
Curvance: Invariants unleashed - The Trail of Bits Blog
Apr 30, 2024 - Welcome to our deep dive into the world of invariant development with Curvance. We’ve been building invariants as part of regular code review assessments for...
bits bloginvariantsunleashedtrail
https://blog.trailofbits.com/categories/research-practice/
research-practice - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
research practicebits blogtrail
https://blog.trailofbits.com/authors/emilio-l%C3%B3pez/
Emilio López - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogemiliotrail
https://blog.trailofbits.com/categories/blockchain/
blockchain - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogblockchaintrail
https://blog.trailofbits.com/2025/01/30/pypi-now-supports-archiving-projects/
PyPI now supports archiving projects - The Trail of Bits Blog
Jan 30, 2025 - PyPI now supports marking projects as archived. Project owners can now archive their project to let users know that the project is not expected to receive any...
bits blogpypisupportsarchivingprojects
https://blog.trailofbits.com/categories/audits/
audits - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogauditstrail
https://blog.trailofbits.com/categories/cryptography/
cryptography - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogcryptographytrail
https://blog.trailofbits.com/2018/
2018 - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blog2018trail
https://blog.trailofbits.com/categories/llvm/
llvm - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogllvmtrail
https://blog.trailofbits.com/authors/coriolan-pinhas/
Coriolan Pinhas - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogtrail
https://blog.trailofbits.com/2018/page/2/
2018 - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blog2018trail
https://blog.trailofbits.com/categories/sinter/
sinter - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogsintertrail
https://blog.trailofbits.com/categories/invariant-development/
invariant-development - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits bloginvariantdevelopmenttrail
https://blog.trailofbits.com/categories/static-analysis/
static-analysis - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
static analysisbits blogtrail
https://blog.trailofbits.com/2024/08/09/trail-of-bits-buttercup-heads-to-darpas-aixcc/
Trail of Bits’ Buttercup heads to DARPA’s AIxCC - The Trail of Bits Blog
Aug 9, 2024 - With DARPA’s AI Cyber Challenge (AIxCC) semifinal starting today at DEF CON 2024, we want to introduce Buttercup, our AIxCC submission. Buttercup is a Cyber...
bits blogtrailbuttercupheads
https://blog.trailofbits.com/page/2/
The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogtrail
https://blog.trailofbits.com/categories/binary-analysis/
binary-analysis - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
binary analysisbits blogtrail
https://blog.trailofbits.com/categories/exploits/
exploits - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogexploitstrail
https://blog.trailofbits.com/authors/andrew-haberlandt/
Andrew Haberlandt - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogandrewhaberlandttrail
https://blog.trailofbits.com/categories/osquery/
osquery - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogosquerytrail
https://blog.trailofbits.com/categories/recursion/
recursion - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogrecursiontrail
https://blog.trailofbits.com/categories/echidna/
echidna - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blogechidnatrail
https://blog.trailofbits.com/2015/
2015 - The Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real...
bits blog2015trail
https://blog.trailofbits.com/2018/09/10/protecting-software-against-exploitation-with-darpas-cfar/
Protecting Software Against Exploitation with DARPA’s CFAR - The Trail of Bits Blog
Sep 10, 2018 - Today, we’re going to talk about a hard problem that we are working on as part of DARPA’s Cyber Fault-Tolerant Attack Recovery (CFAR) program: automatically...
bits blogprotectingsoftwareexploitationcfar
https://blog.trailofbits.com/2015/05/05/empire-hacking/
Empire Hacking, a New Meetup in NYC - The Trail of Bits Blog
May 5, 2015 - Today we are launching Empire Hacking, a bi-monthly meetup that focuses on pragmatic security research and new discoveries in attack and defense. Empire...
bits blogempirehackingnewmeetup
https://blog.pinkworld.com/libraryofthumbs/aidra-fox-showing-all-her-pretty-bits-in-closeup-shots-8347.html
Aidra Fox showing all her pretty bits in closeup shots at PinkWorld Blog
Watch Aidra Fox showing all her pretty bits in closeup shots at PinkWorld Blog
aidra fox showingcloseup shotspinkworld blogprettybits