RL Blog
city skyline with colorful bars popping up
May 20, 2025

NIST Adversarial ML Guidance: How RL Can Secure Your Organization

New NIST guidance identifies ML challenges. Here’s why ReversingLabs Spectra Assure should be an essential part of your solution.

Read More about NIST Adversarial ML Guidance: How RL Can Secure Your Organization
NIST Adversarial ML Guidance: How RL Can Secure Your Organization
ominous hooded figure in front of monitors with a world map background
May 15, 2025

Backdoor implant discovered on PyPI posing as debugging utility

RL researchers detected a sophisticated, malicious package believed to be an ongoing campaign that may be linked to a hacktivist gang.

Read More about Backdoor implant discovered on PyPI posing as debugging utility
Backdoor implant discovered on PyPI posing as debugging utility
cloud stock photo
May 14, 2025

5 reasons you need an SaaSBOM

Here's why your organization should consider using SaaSBOMs, key challenges — and how to put CycloneDX's xBOM standard into action.

Read More about 5 reasons you need an SaaSBOM
5 reasons you need an SaaSBOM
animated AI computer chip in server room
May 14, 2025

MCP is a powerful new AI coding technology: Understand the risks

Model Context Protocol makes agentic AI development easier by connecting data sources — but the risks are very real. Here's what you need to know.

Read More about MCP is a powerful new AI coding technology: Understand the risks
MCP is a powerful new AI coding technology: Understand the risks
From the Labs: YARA Rule for Detecting Conti
May 13, 2025

From the Labs: YARA Rule for Detecting Conti

ReversingLabs’ YARA detection rule for Conti can help you detect this ransomware in your environment. We provide tools and information that you can use to spot CONTI at work in your environment.

Read More about From the Labs: YARA Rule for Detecting Conti
From the Labs: YARA Rule for Detecting Conti
Gold coins in front of abstract floating code
May 13, 2025

Same name, different hack: PyPI package targets Solana developers

A new Python package revives the name of a malicious module to steal source code and secrets from blockchain developers’ machines.

Read More about Same name, different hack: PyPI package targets Solana developers
Same name, different hack: PyPI package targets Solana developers
brown glass bottle of poison
May 8, 2025

Indirect prompt injection attacks target common LLM data sources

Malicious instructions buried in LLM sources such as documents can poison ML models. Here's how it works — and how to protect your AI systems.

Read More about Indirect prompt injection attacks target common LLM data sources
Indirect prompt injection attacks target common LLM data sources
big sign that says manage your risk
May 7, 2025

SaaS risk is on the rise: 7 action items for better management

The rapid rise of SaaS apps has spawned new risks. One new hopeful stands out: The SaaSBOM. Here are key steps that help rein them in.

Read More about SaaS risk is on the rise: 7 action items for better management
SaaS risk is on the rise: 7 action items for better management
man in suit hands holding AI
May 6, 2025

MIT researchers tame AI code with new controls

The sequential Monte Carlo method guides LLMs to produce code that plays by basic programming rules. Here's what you need to know.

Read More about MIT researchers tame AI code with new controls
MIT researchers tame AI code with new controls
third-party risk
May 1, 2025

Mobile and third-party risk: How legacy testing leaves you exposed

Without modern application security tooling, including binary analysis, the third-party risk management puzzle is incomplete.

Read More about Mobile and third-party risk: How legacy testing leaves you exposed
Mobile and third-party risk: How legacy testing leaves you exposed
people working at laptops
April 30, 2025

Secrets leaks increase — and expand beyond the codebase

Leaks from GitHub and other repos are up, but collaboration tools such as Slack and Jira are now a major threat — and a serious blind spot.

Read More about Secrets leaks increase — and expand beyond the codebase
Secrets leaks increase — and expand beyond the codebase
matrix of icons coming out of a tablet
April 29, 2025

Rise of the xBOM: The new go-to tool for software security

CycloneDX 1.6's ML-BOM, SaaSBOM, and CBOM are non-negotiable visibility requirements in the software supply chain security era.

Read More about Rise of the xBOM: The new go-to tool for software security
Rise of the xBOM: The new go-to tool for software security
cube labelled ml-bom
April 25, 2025

Secure Your AI Supply Chain with the ML-BOM

The ML-BOM capability in RL's Spectra Assure SAFE Report provides immediate visibility into every ML model in your environment.

Read More about Secure Your AI Supply Chain with the ML-BOM
Secure Your AI Supply Chain with the ML-BOM
xBOM in block text
April 25, 2025

What is the xBOM?

Understand the difference between the SBOM and xBOM — and how it impacts software supply chain security.

Read More about What is the xBOM?
What is the xBOM?
microphone in front of blue curtain
April 24, 2025

Verizon 2025 DBIR: Third-party software risk takes the spotlight

The latest Data Breach Investigations Report puts the focus squarely on third-party risk. Here’s what you need to know.

Read More about Verizon 2025 DBIR: Third-party software risk takes the spotlight
Verizon 2025 DBIR: Third-party software risk takes the spotlight
Previous1...101112...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu