
Malicious NuGet package targets Stripe
Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.

Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.

RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.

Here’s what you need to know about their impact on software security — and what you can do to fight back.

RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.

Threat actors targeted developers with a bogus package — a shift away from the recent crypto development hack focus.

Here’s what you need to know about their impact on software security — and what you can do to fight back.

With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.

Learn how to use RL’s analysis of "pkr_mtsi" to advance your detection engineering in Spectra Analyze.

Legacy strategies and tooling can’t manage today’s software threats. Here’s why binary analysis is necessary.

Here’s a more-in-depth technical analysis of the packages involved in the "graphalgo" campaign.

A new branch of a fake job recruitment campaign, dubbed "graphalgo," is targeting developers with a RAT.

Here are the takeaways CISOs and other security leaders should consider for their TPCRM strategies.

A compromise of the source code editor underscores attack method diversification. It's time to go beyond trust.

The Vulnerable MCP Servers Lab delivers integration training, demos, and instruction on attack methods.

ReversingLabs looked at last year’s Software Supply Chain Security Report in the rear-view mirror. Here’s what RL got right — and wrong.

By combining early infrastructure detection with supply chain security controls you can give your defenders a leg up.

AI tools are making Rust a favorite language of developers — even those maintaining codebases like Microsoft’s.

Here are the guidelines, mandates, frameworks, and goals that have refined software supply chain security policy.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial