Pixel Binary Transparency: verifiable security for Pixel devices

Pixel Binary Transparency: verifiable security for Pixel devices

Android 14 introduces cellular connectivity security features

A Year in Review of 0-days Exploited In-the-Wild in 2022

An important step towards secure and interoperable messaging

Supply chain security for Go, Part 3: Shifting left

Learnings from kCTF VRP's 42 Linux kernel exploits submissions

Securely Hosting User Data in Modern Web Applications

Google Introduces Passkey Authentication

Supply chain security for Go, Part 1: Vulnerability management

Google Authenticator now supports Google Account synchronization

Announcing the deps.dev API: critical dependency data for secure supply chains

Google's OSS-Fuzz expands fuzz-reward program

Supporting the Use of Rust in the Chromium Project

Memory Safe Languages in Android 13

Use-after-freedom: MiraclePtr

The Open Sourcing of Paranoid's Library

DNS-over-HTTP/3 in Android

Retrofitting Temporal Memory Safety on C++

Improving software supply chain security with tamper-proof builds

Understanding the Impact of Apache Log4j Vulnerability

The Secure Open Source Pilot Program

An update on Memory Safety in Chrome

Google Online Security Blog: An update on Memory Safety in Chrome

Linux Kernel Security Done Right

AllStar: Continuous Security Policy Enforcement for GitHub Projects

A New Chapter for Google’s Vulnerability Reward Program

Verifiable Supply Chain Metadata for Tekton

Measuring Security Risks in Open Source

SLSA, an End-to-End Framework for Supply Chain Integrity

More →