Trail of Bits67 · 2026-02-25 12:00
mquire: Linux memory forensics without external dependencies
If you’ve ever done Linux memory forensics, you know the frustration: without debug symbols that match the exact kernel version, you’re stuck. These symbols aren’t typically installed on production systems and must be sourced from external repositories, which quickly become outdated when systems receive updates. If you’ve ever tried to analyze a memory dump only to discover that no one has published symbols for that specific kernel build, you know the frustration. Today, we’re open-sourcing m...
Haptik8 · 2026-02-25 03:16
When AI Listens: Security and Privacy Challenges in Enterprise AI Voice Agents
Voice has rapidly become the main interface between enterprises and their customers. AI voice agents now handle service requests, authentication, payments, and issue resolution at scale. In doing so, they move beyond responding, they actively listen , in real-time and at scale. When AI listens, the security and privacy stakes fundamentally change. The focus is no longer limited to protecting databases and dashboards, but extends to safeguarding live conversations, emotions, and intent. This s...