ReversingLabs Blog

Tomislav Peričin

Tomislav Peričin
Chief Software Architect & Co-Founder at ReversingLabs. Tomislav founded ReversingLabs in 2009 and serves as Chief Architect, leading all aspects of the company's product and services strategy as well as implementation. He has been analyzing and developing software packing and protection methods for the last 8 years. As chief software architect, he has conceived and driven the development of such projects as TiCore, TitanEngine, NyxEngine and RLPack. Recently, he spoke at BlackHat, ReCon, CARO Workshop, SAS and TechnoSecurity conferences.

Recent Posts from Tomislav Peričin

September 19, 2022

White House memo calls for software supply chain security, takes a step closer to mandating SBOMs

The new memorandum calls on firms selling software to the federal government to attest to its conformity with NIST security standards. Here's what you need to know.
December 16, 2020

SolarWinds breach: The next level of stealth

The SunBurst supply chain attack, which was behind the SolarWinds compromise, took sophistication and patience.
August 4, 2020

Machine Learning for Humans

Explainability. Transparency. Relevancy.
June 30, 2020

Level up your YARA game

YARA is an important piece in the defenders chess set. Depending on how you play the game you can think of YARA as either a bishop or a rook. Powerful weapon in the hands of a threat hunter, or a layer that makes the defenders wall a bigger obstacle to overcome.
May 6, 2020

Introducing Explainable Threat Intelligence

Next-generation threat detection and hunting algorithms built for humans
February 18, 2020

Introducing Explainable Machine Learning

Observing the direction other security companies have taken, we at ReversingLabs felt that something big was missing: No one was focusing on the human element. We found that there wasn't a solution in the market that tried to bridge the gap between detecting malware and helping analysts understand why such detections happened in the first place.
October 30, 2019

Breaking the Linux Authenticode security model

Portable executable is probably the most prolific application format used for code distribution. It can be found on a wide variety of hardware and software platforms. That’s why it is no wonder that many systems, other than its native Windows, end up supporting it in one way or another.
October 30, 2019

Breaking the UEFI firmware Authenticode security model

Unified Extensible Firmware Interface (UEFI) is a specification that defines the interfaces between the operating system and the platform firmware. Originally developed by Intel, and now supported by an alliance of software and hardware vendors, UEFI quickly became a standard that displaced the legacy basic input/output system (BIOS).
October 30, 2019

Breaking the Windows Authenticode security model

Authenticode is a Microsoft code signing technology designed to guarantee the origin and integrity of an application. The core principle of its integrity verification system is code immutability
September 16, 2019

Digital Certificates - Models for Trust and Targets for Misuse

Blog 6: A New Kind of Certificate Fraud: Executive Impersonation
August 22, 2019

The NPM package that walked away with all your passwords

Software developers are increasingly being targeted by supply chain attacks. Popularization of package managers and their integration into the development pipelines has made this ecosystem an interesting target for various threat actors.
August 6, 2019

The PDF invoice that phished you

Phishing attacks are deception attempts that try to trick a person into clicking a link that leads to a credential-stealing page or a malicious application download. Relying on social engineering tactics, they have the potential to grant attackers unauthorized access to infrastructure, services, or information.


Get our blog delivered to your in-box weekly to stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ConversingLabs: The State of Open Source Software Security ConversingLabs: The State of Open Source Software Security
Conversations About Threat Hunting and Software Supply Chain Security
ReversingGlass: SBOMS and threat modeling ReversingGlass: SBOMS and threat modeling
Glassboard conversations with ReversingLabs Field CISO Matt Rose
Software Package Deconstruction: Video Conferencing Software Software Package Deconstruction: Video Conferencing Software
Analyzing Risks To Your Software Supply Chain