RL Blog
cute hamster
April 23, 2025

Changes to CVE program are a call to action on your AppSec strategy

The CVE's challenges mean it's time to get off the vulnerability hamster wheel and modernize your risk program.

Read More about Changes to CVE program are a call to action on your AppSec strategy
Changes to CVE program are a call to action on your AppSec strategy
decapitated robot toy
April 17, 2025

NIST's adversarial ML guidance: 6 action items for your security team

ML attacks are evolving, putting mitigation a step behind. Here’s what to focus on — and why traditional AppSec tooling is not up to the job.

Read More about NIST's adversarial ML guidance: 6 action items for your security team
NIST's adversarial ML guidance: 6 action items for your security team
mug with text that says we're hiring
April 16, 2025

The cybersecurity job market is complicated: 3 key insights

While the state of cybersecurity careers is confusing, key trends are driving companies to think big-picture — and outside of traditional roles.

Read More about The cybersecurity job market is complicated: 3 key insights
The cybersecurity job market is complicated: 3 key insights
red road sign that says breakthrough
April 15, 2025

Quantum delivers really random numbers: How that boosts AppSec

Quantum random number generators can make software — including software development secrets — more secure. Here's how it works.

Read More about Quantum delivers really random numbers: How that boosts AppSec
Quantum delivers really random numbers: How that boosts AppSec
red microchip with bitcoin logo
April 10, 2025

Atomic and Exodus crypto wallets targeted in malicious npm campaign

RL researchers have identified yet another npm package that uses malicious patching of local software to hijack cryptocurrency transfers.

Read More about Atomic and Exodus crypto wallets targeted in malicious npm campaign
Atomic and Exodus crypto wallets targeted in malicious npm campaign
retro toy robot
April 9, 2025

Vibe coding: What automating development means for AppSec

Vibe coding — AI coding using prompt engineering — is making application security more challenging. Here's what you need to know.

Read More about Vibe coding: What automating development means for AppSec
Vibe coding: What automating development means for AppSec
six men in singlets running race on track
April 8, 2025

The race to secure the AI/ML supply chain is on — get out front

Software supply chain risks from artificial intelligence and machine learning are getting real. Here are key insights from RL’s new report.

Read More about The race to secure the AI/ML supply chain is on — get out front
The race to secure the AI/ML supply chain is on — get out front
gold coin with bitcoin symbol in front of paper money rolls
April 3, 2025

Malicious Python packages target popular Bitcoin library

RL researchers detected two Python libraries that are designed to steal sensitive data while posing as fixes for a popular cryptocurrency library.

Read More about Malicious Python packages target popular Bitcoin library
Malicious Python packages target popular Bitcoin library
man in glasses lenses reflecting computer data
April 2, 2025

CVEs lose relevance: Get proactive — and think beyond vulnerabilities

More cracks in the NVD emerge, making the CVE system less useful. Shift your approach to keep up with software risk.

Read More about CVEs lose relevance: Get proactive — and think beyond vulnerabilities
CVEs lose relevance: Get proactive — and think beyond vulnerabilities
neon open sign
April 1, 2025

OpenSSF guidelines encourage OSS developers to build securely

The Open Source Secure Baseline provides a framework for securing OSS development — but it could breed complacency.

Read More about OpenSSF guidelines encourage OSS developers to build securely
OpenSSF guidelines encourage OSS developers to build securely
line of soldiers in uniform from the knees down
March 27, 2025

AI coding tools weaponized: What your AppSec team needs to know

The Rules File Backdoor attack method is pernicious — and one that can be easily exploited with the rise of 'vibe coding' and agentic AI.

Read More about AI coding tools weaponized: What your AppSec team needs to know
AI coding tools weaponized: What your AppSec team needs to know
three men sitting in front of monitors
March 26, 2025

Malware found on npm infecting local package with reverse shell

For the first time, RL researchers discover malicious locally-installed npm packages infecting other legitimate packages.

Read More about Malware found on npm infecting local package with reverse shell
Malware found on npm infecting local package with reverse shell
dart board on a person back
March 25, 2025

Crypto malware attacks: 23 supply chain incidents set off alarms

Target on back-alert: Open source was increasingly exploited in attacks on cryptocurrency infrastructure and apps in 2024.

Read More about Crypto malware attacks: 23 supply chain incidents set off alarms
Crypto malware attacks: 23 supply chain incidents set off alarms
hand stopping line of falling dominoes
March 20, 2025

CISO survey: 6 lessons to boost third-party cyber-risk management

Risk is rising across the software supply chain while visibility remains low, making TPCRM challenging. Here's what you need to know.

Read More about CISO survey: 6 lessons to boost third-party cyber-risk management
CISO survey: 6 lessons to boost third-party cyber-risk management
three sticky notes spelling out oss
March 19, 2025

Less malware, more risk: The changing face of open-source security

Instances of malware on open-source software repositories dropped in 2024 — but OSS risk is on the rise. Here’s what you need to know.

Read More about Less malware, more risk: The changing face of open-source security
Less malware, more risk: The changing face of open-source security
Previous1...111213...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top