I just posted a blog, it is 100% nicer and more restrained than our development team would have posted. Read between the lines, people.... ;-)
https://www.isc.org/blogs/2026-04-16-How-to-report-a-vulnerability/
I just posted a blog, it is 100% nicer and more restrained than our development team would have posted. Read between the lines, people.... ;-)
https://www.isc.org/blogs/2026-04-16-How-to-report-a-vulnerability/
Google used a ZK proof to disclose a quantum breakthrough that cuts the cost of breaking cryptocurrency by 20x without handing attackers the circuit.
The Rust code behind the proof had memory safety bugs. We used this new attack surface to forge a proof that beats Google’s on every metric.
Google patched it within days. Their quantum claims are unaffected. https://blog.trailofbits.com/2026/04/17/we-beat-googles-zero-knowledge-proof-of-quantum-cryptanalysis/

Trail of Bits discovered and exploited memory safety and logic vulnerabilities in Google’s Rust zero-knowledge proof code to forge a proof claiming better quantum circuit performance metrics than Google’s original results, demonstrating unique security risks in zkVM systems.
New.
Push Security: Post-Sanction Persistence: Triad Nexus' Operations Infrastructure Reborn as Threat Actor Distances Activity from FUNNULL CDN https://www.silentpush.com/blog/triad-nexus-funnull-2026/
More:
Infosecurity-Magazine: Triad Nexus Expands Global Fraud Operations Despite US Sanctions https://www.infosecurity-magazine.com/news/triad-nexus-expands-fraud/ #infosec #threatresearch
Coworker: I have an idea.
Me: Again?