
ReversingLabs Hashing Algorithm
Here's what you need to know about RL's predictive malware detection.
Read More about ReversingLabs Hashing AlgorithmHere's what you need to know about RL's predictive malware detection.
Read More about ReversingLabs Hashing AlgorithmTwo newly discovered extensions on the VS Code Marketplace are designed to steal sensitive information, showing that open source attacks are expanding.
Read More about Malicious helpers: VS Code Extensions observed stealing sensitive informationSoftware complexity is growing — making SBOMs a necessity. But they need to be actionable to manage risk. Here's how to put them to work.
Read More about To better manage risk, make your software bills of materials actionableSoftware tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.
Read More about A software supply chain meltdown: What we know about the XZ TrojanUnderstand the state of software supply chain security with key takeaways from recent research and surveys of application security and development pros.
Read More about 30 SSCS statistics that matter for software security teamsHere's what the RL research team knows about the suspicious SqzrFramework480 campaign, which is still available on the NuGet repository.
Read More about Suspicious NuGet package grabs data from industrial systemsMemory safety is one of the most stubborn and dangerous software weaknesses. Here are key insights and takeaways from a new Google report on the issue.
Read More about Memory-safe languages and security by design: Key insights, lessons learnedCode bloat is at the root of many security problems. Here's how development teams can bolster application security with more efficient code.
Read More about 7 ways to put your code on a diet — and improve AppSec in the processHere’s what we know about the federal government's new software security form — and what needs to change. For one, SBOMs should be required.
Read More about How CISA’s secure software development attestation form falls shortHere are the top security trends of the year — and what your team needs to know about them. AI, for one, has its pros and cons for your security posture.
Read More about Gartner outlines top cybersecurity trends — and (spoiler alert) AI is No. 1RL has discovered a campaign using PyPI packages posing as open-source libraries to steal BIP39 mnemonic phrases, which are used for wallet recovery.
Read More about BIPClip: Malicious PyPI packages target crypto wallet recovery passwordsThe FDA now requires medical device manufacturers to produce a software bill of materials to ensure supply chain security. Here’s what you need to know.
Read More about SBOMs and medical devices: An essential step — but no security cureallThere are many reasons to consider a career in AppSec, but one stands out: Software supply attacks are creating job security and opportunity.
Read More about 5 reasons you should consider a career in application securityWhy Relying on Sandboxes Alone Leaves You Exposed — And How Next-Gen Binary Analysis Closes the Gaps
Read More about Bad Actors are Going to School on Sandboxes: Here's What to Do About It!NIST's Cybersecurity Framework 2.0 has been released, complete with a new focus on software supply chain security. Here are the key takeaways for your team.
Read More about NIST CSF 2.0: Better risk management for the new era of supply chain securityGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial