Please turn on your JavaScript for this page to function normally.
trusted execution environment
New cross-industry consortium aims to accelerate confidential computing adoption
The Linux Foundation announced the intent to form the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential …
Qualcomm chips leak crypto data from secure execution environment
A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, …
Featured news
Resources
Don't miss
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
- Global Threat Map: Open-source real-time situational awareness platform
- How Secure by Design helps developers build secure software
- Why incident response breaks down when it matters most
- Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)