Trail of Bits45 · 2026-04-01 11:00
Mutation testing for the agentic era
Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measures execution, not verification. Test suites with high coverage can obfuscate the fact that critical functionality is untested as software develops over time. We saw this when mutation testing uncovered a high-severity Arkis protocol vulnerability , overlooked by coverage metrics, that would have allowed attackers to drain funds. Today, w...
Rapid7 Blog40 · 2026-04-01 13:00
What CISOs Should Expect from AI Powered MDR in 2026, According to Rapid7 CEO Corey Thomas
In the latest episode of Rapid7’s Experts on Experts, I’m joined by Rapid7 CEO Corey Thomas for a candid conversation about where AI is genuinely changing security operations, and where the hype still outruns reality. The short version is that AI is already improving productivity in software development, but the bigger shift for security leaders is what it can do with telemetry at scale. As Corey puts it, no team of humans can process all security telemetry, all the time, across an entire env...
maurycyz.com15 · 2026-04-01 00:00
GopherTree
While gopher is usually seen as a proto-web, it's really closer to FTP. It has no markup format, no links and no URLs. Files are arranged in a hierarchically, and can be in any format. This rigid structure allows clients to get creative with how it's displayed ... which is why I'm extremely disappointed that everyone renders gopher menus like shitty websites: You see all that text mixed into the menu? Those are informational selectors: a non-standard feature that's often used to recreate hype...
Blogs on STAR Labs12 · 2026-04-01 00:00
CHECK Removed, Context Confused, Checkmate Achieved
TL;DR In January 2026, the Chrome Releases blog announced several security fixes across different Chrome components. One entry caught our attention: CVE-2026-0899 , an Out-of-Bounds memory access in V8 discovered by @p1nky4745 . Vulnerabilities in V8, especially OOB and Type Confusions are always interesting from a security research perspective. We decided to take a closer look. At the time of writing, the issue was still restricted and no public proof-of-concept was available. After reverse ...
Cyber Threat Alliance8 · 2026-04-01 10:00
Cyber Threat Alliance Welcomes Motorola Solutions as Newest Member
WASHINGTON – April 1, 2026 – Cyber Threat Alliance (CTA), a nonprofit organization dedicated to improving the cybersecurity of the global digital ecosystem, today announced Motorola Solutions as its newest member and first in the safety and security technology sector. CTA and Motorola Solutions, including the Public Safety Threat Alliance (PSTA) it founded and administrates, … Continued The post Cyber Threat Alliance Welcomes Motorola Solutions as Newest Member appeared first on Cyber Threat ...
Ariya Hidayat8 · 2026-04-01 04:42
Local, CPU-Friendly, High-Quality TTS (Text-to-Speech) with Kokoro
Just a few years ago, realistic local speech generation seemed unimaginable. Today, its quality is exceptional and, crucially, it delivers these results without compromising privacy.
ElcomSoft blog6 · 2026-04-01 14:21
Digital Rights vs. State Power – The Protectors
The first part of this series examined jurisdictions that have adopted a coercive approach to cryptographic barriers. Nations such as the United Kingdom, Australia, and France navigate the practical hurdles of end-to-end encryption through statutory workarounds. Rather than attempting to break the encryption itself, these legal systems apply pressure directly to the device owner – […]