RL Blog
cyber ranch podcast title card
September 11, 2024

What’s in your commercial software?

RL’s Saša Zdjelar joined 'The Cyber Ranch Podcast' to discuss why organizations need to better scrutinize the software they use. Here are the key takeaways.

Read More about What’s in your commercial software?
What’s in your commercial software?
ominous faceless hooded figures doing computer things
September 10, 2024

Fake recruiter coding tests target devs with malicious Python packages

RL found the VMConnect campaign continuing with malicious actors posing as recruiters, using packages and the names of financial firms to lure developers.

Read More about Fake recruiter coding tests target devs with malicious Python packages
Fake recruiter coding tests target devs with malicious Python packages
itgrcforum webast title card
September 5, 2024

Supply chain risk makes software stack visibility essential

IT GRC Forum expert panel: Get back to basics and put your SBOMs to work for better software security. Here are key takeaways.

Read More about Supply chain risk makes software stack visibility essential
Supply chain risk makes software stack visibility essential
chain links
September 5, 2024

Coordinate Your Software Supply Chain Security With Shareable Spectra Assure SAFE Reports

The ReversingLabs Spectra Assure SAFE Report brings readily digestible visibility to software supply chain threats and collaboration for effective risk management.

Read More about Coordinate Your Software Supply Chain Security With Shareable Spectra Assure SAFE Reports
Coordinate Your Software Supply Chain Security With Shareable Spectra Assure SAFE Reports
secure by design secure by demand
September 4, 2024

Secure by Demand: Going Beyond Questionnaires & Software Bills of Materials

Enterprise buyers need direct, verifiable evidence of software security. Here's why your organization needs to trust, but verify.

Read More about Secure by Demand: Going Beyond Questionnaires & Software Bills of Materials
Secure by Demand: Going Beyond Questionnaires & Software Bills of Materials
red malware written among binary code
September 3, 2024

EPSS and vulnerability management: New scoring system shows promise

The Exploit Prediction Scoring System performs better than CISA's KEV and CVSS scores for vulnerabilities in the wild — but combining all three works best.

Read More about EPSS and vulnerability management: New scoring system shows promise
EPSS and vulnerability management: New scoring system shows promise
man holding scroll tied with red silk ribbon
August 28, 2024

Do cybersecurity certifications still deliver? Experts share 6 key insights

With AI and the shift from the perimeter to the software supply chain as a primary attack vector, are certifications still relevant? Here's what top experts say.

Read More about Do cybersecurity certifications still deliver? Experts share 6 key insights
Do cybersecurity certifications still deliver? Experts share 6 key insights
three locks in front of binary code streaming down over open laptop
August 22, 2024

With quantum coming, NIST readies new software supply chain protection

The Post Quantum Cryptography program aims to bolster key components such as public-key algorithms. Here's a full rundown.

Read More about With quantum coming, NIST readies new software supply chain protection
With quantum coming, NIST readies new software supply chain protection
guy on computer with constellations and world map projected behind him
August 21, 2024

Think Log4j is a wrap? Think again.

Here's what you need to know about why the Log4j flaw, Log4Shell, remains a threat — and how to protect your organization with a modern software security approach.

Read More about Think Log4j is a wrap? Think again.
Think Log4j is a wrap? Think again.
help wanted post it on laptop
August 20, 2024

Cybersecurity's workforce woes are a myth: 5 ways to rethink recruiting

Leaders say a cybersecurity talent shortage is a myth — instead, it's a plain old hiring and training gap. And the industry is making the problem worse.

Read More about Cybersecurity's workforce woes are a myth: 5 ways to rethink recruiting
Cybersecurity's workforce woes are a myth: 5 ways to rethink recruiting
road sign reading challenges backdrop mountains
August 15, 2024

5 SecOps automation challenges — and how to overcome them

Here are the key trends driving SecOps automation, its numerous benefits — and the main challenges organizations face when automating their SOC.

Read More about 5 SecOps automation challenges — and how to overcome them
5 SecOps automation challenges — and how to overcome them
fatigued man rubbing eyes at monitors
August 13, 2024

Hacker Summer Camp: Reboot needed to tackle software supply chain threats

Leaders from the private sector and government called for a rethink of outdated security tools and practices in an age of API-driven services and AI.

Read More about Hacker Summer Camp: Reboot needed to tackle software supply chain threats
Hacker Summer Camp: Reboot needed to tackle software supply chain threats
secure by design secure by demand sign
August 8, 2024

Secure by Demand: Key takeaways for enterprise software buyers

CISA has released an add-on to its supply chain security initiative Secure by Design, with a focus on commercial software. Here’s what you need to know.

Read More about Secure by Demand: Key takeaways for enterprise software buyers
Secure by Demand: Key takeaways for enterprise software buyers
spectra new features announcement
August 7, 2024

RL Spectra Advanced File Analysis and Malware Detection Suite Updates

Announcing ReversingLabs Spectra Analyze version 9.1 and Spectra Detect version 5.1

Read More about RL Spectra Advanced File Analysis and Malware Detection Suite Updates
RL Spectra Advanced File Analysis and Malware Detection Suite Updates
track athlete clearing a hurdle
August 7, 2024

Software complexity is a real problem — and your AppSec must factor that in

Software complexity causes many challenges. Here are the key problem areas — and how to overcome the hurdles with a modern supply chain security approach.

Read More about Software complexity is a real problem — and your AppSec must factor that in
Software complexity is a real problem — and your AppSec must factor that in
Previous1...171819...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top