
SharePoint zero-day: What we know
The software supply chain incident highlights how quickly threat actors can turn newly revealed vulnerabilities into widespread attacks.

Writer, ReversingLabs. Carolynn is a reporter, writer, and researcher in the cybersecurity space. She has written for several publications, such as The Security Ledger and Security Boulevard. She has been involved in podcast and event production, and now produces ConversingLabs, a ReversingLabs podcast. Prior to joining ReversingLabs, Carolynn held communication roles in the non-profit and higher education spaces. Her official title at ReversingLabs is Manager, Content Marketing.
find Carolynn van Arsdale on:

The software supply chain incident highlights how quickly threat actors can turn newly revealed vulnerabilities into widespread attacks.

Software procurement is risky business. Learn why outdated tooling doesn’t cut it — and how modern technologies can provide much-needed transparency.

Understand the difference between the SBOM and xBOM — and how it impacts software supply chain security.

The latest Data Breach Investigations Report puts the focus squarely on third-party risk. Here’s what you need to know.

Software supply chain risks from artificial intelligence and machine learning are getting real. Here are key insights from RL’s new report.

More cracks in the NVD emerge, making the CVE system less useful. Shift your approach to keep up with software risk.

Target on back-alert: Open source was increasingly exploited in attacks on cryptocurrency infrastructure and apps in 2024.

Ransomware kept its stride in 2024. In 2025, threat actors are moving toward targeting key parts of the software supply chain. Here are key lessons.

Hacks of rspack, vant highlight the growing trend of cryptomining compromises spreading via top open-source packages.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial