RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research
Why RL Built Spectra Assure Community
April 14, 2026

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Read More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Products & TechnologyMay 14, 2026

RL Joins NATO's Live-Fire Cyber Event

ReversingLabs joined forces in NATO's Locked Shields 2026 to bolster defenders. Here are key lessons.

paul roberts headshot black and white
Paul Roberts, Director of Content and Editorial at RLPaul Roberts
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Locked Shields 2026: RL Helps Defenders Stand Their Ground

For two punishing days in late April, cyber defenders from 41 nations huddled in front of screens around the globe, repelling waves of simulated attacks against fictional national infrastructure. The occasion: Locked Shields 2026, NATO's annual live-fire cyber exercise — and the largest of its kind in the world. ReversingLabs (RL) was proud to be a part of it.

This year's exercise marked a milestone for the Republic of Croatia and the Republic of North Macedonia, which fielded a joint Blue Team for the first time under the leadership of Croatia's Ministry of Defense (MORH). It also marked a milestone for RL, which deployed four of its top experts and its Spectra Analyze malware analysis platform in support of the joint team— alongside industry partners ExtraHop Networks, Inc. and Forescout Technologies, Inc.

Here’s what you need to know about Locked Shields 2026 — and three key lessons to carry forward.

A Brief History of Locked Shields

Held annually since 2010 by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn, Estonia, Locked Shields has evolved rapidly in recent years. Just four nations and about 60 participants took part in the inaugural event. By 2026, Locked Shields had grown to bring together more than 4,000 participants from 41 NATO Allied and partner nations. They included cyber defenders, legal experts, strategists, and communicators charged with defending thousands of virtual systems against a relentless stream of attacks.

What sets Locked Shields apart from a typical capture-the-flag is its realism. Blue Teams don't just face technical exploits, they wrestle with strategic decision-making, forensic analysis, legal questions, public communications, and coordinated incident response — all at wartime tempo. Each year, the exercise incorporates new domains: cloud, operational technology, AI-enabled attacks, even quantum computing concepts in this year's Strategic Decision-Making track.

A Tough — and Telling — Debut

The first day was, by every measure, brutal. NATO's Red Team launched hundreds of attacks against the Croatia–North Macedonia Blue Team in just eight hours, with many reaching their targets. Like defenders in real world incidents, the Blue Team was challenged to quickly orient themselves and triage the victims of the red team attacks, while also battling new attacks and fighting to keep critical systems and infrastructure functioning. 

"It felt like ‘two steps forward, one step back’ at times, said Hrvoje Samardžić, a threat intelligence researcher at RL who took part in the exercise and served on the Reporting and CTI team. "As one case was solved, three new ones were being opened."

By day two of the exercise, however, things started to look different. Processes had been sharpened, communication tightened, and the Blue Team began to find its footing. By the end of the exercise, the joint Croatia-North Macedonia squad had posted competitive standings against far more experienced Blue Teams — and earned RLRL a Certificate of Appreciation from Croatia's Ministry of Defense for its contribution.

Spectra Analyze Under Fire

Throughout the exercise, the Croatian SOC team relied on RL's Spectra Analyze platform to triage malware samples encountered by the Blue Team — quickly, privately, and without reliance on public sandboxes that could leak sensitive operational data. In several cases, Spectra Analyze extracted full malware configurations, yielding actionable indicators of compromise (IOCs) that defenders pushed into MISP, where they were consumed by intrusion-detection systems for tracking and blocking.

Joining RL at Locked Shields were ExtraHop and Forescout, two partner organizations that were on the ground in Zagreb as well. Both firms held workshops for SOC and network team members and demonstrated their solutions' value against PCAPs collected from the cyber range.

"ReversingLabs is honored to have participated in the 2026 Locked Shields exercise,” said Mario Vuksan, the CEO and co-founder of RL.

“Close collaboration by defenders and their tech partners is critical in the real life cyber incidents that Locked Shields emulates. So is having a comprehensive defensive technology stack like the one RL and our partners at ExtraHop and Forescout are building."

Together, the three vendors gave the joint Blue Team a defensive stack covering network detection, asset visibility, and deep file analysis — critical capabilities that modern SOCs need to navigate today's threat landscape. 

"Cyber defense at this scale is a team sport. By pairing real-time network visibility with deep forensic analysis, we aren’t just giving defenders more data. We’re giving them the 'home field advantage' needed to outpace nation-state actors," says Sarah Cleveland, Senior Director of Federal Strategy at ExtraHop.

“Locked Shields put real people, real tools, and real pressure together in real‑world scenarios on hybrid networks,” said Barry Mainz, CEO, Forescout. “Forescout was honored to stand shoulder to shoulder with RL and ExtraHop to support the joint Croatia-North Macedonia team as they built resilience under fire. The exercise highlighted the importance of comprehensive device intelligence and policy‑driven control — areas where Forescout excels and which become even more powerful when combined with complementary partner capabilities.”

Lessons Worth Carrying Forward

Three clear takeaways from Locked Shields 2026 stand out.

1. Scale and Tooling Matter

Defenders are perpetually outnumbered. Tooling that automates triage — particularly malware analysis that returns IOCs and configurations in minutes rather than hours — is a necessity, not a luxury.

2. Integration is the Next Frontier 

One ambition for the initiative was to wire ExtraHop's and Forescout's network-detection capabilities directly into Spectra Analyze: detect a suspicious file on the wire, submit it for analysis, and receive a reputation verdict back to drive automated blocking. Cyber-range constraints kept that workflow from being fully realized this year — but it points clearly to where defensive operations are heading. Should similar technologies be deployed by potential targets of state sponsored attacks, those organizations would stand a much better chance of turning back attacks like those in the Locked Shields exercise, experts agreed.

3. Preparation is Everything

Blue Teams that come in cold get rolled. Teams that have rehearsed their processes, pre-tuned their tooling, and trained their operators stand a fighting chance — even against the world's best Red Team.

Locked Shields 2026 is over. Locked Shields 2027 is, in a sense, already underway. Congratulations to the Croatian Ministry of Defense, to the Armed Forces of North Macedonia, to our partners at ExtraHop and Forescout, and to every defender who took part. RL is honored to stand with you.


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

Retrohunting Telegram Bots

Spectra Analyze in Action: Retrohunting Bots

Learn how to use ReversingLabs’ Spectra Analyze to expand your detection of malicious Telegram C2 bots.

Learn More about Spectra Analyze in Action: Retrohunting Bots
Spectra Analyze in Action: Retrohunting Bots
QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top