
Hunting SharpHounds with Spectra Analyze
ReversingLabs’ Advanced Search is a powerful feature that can gather related samples for threat hunting in your environment. Here's how.

ReversingLabs’ Advanced Search is a powerful feature that can gather related samples for threat hunting in your environment. Here's how.

Funding of the OSS ecosystem has reached a crisis as threat actors increasingly target weaknesses in infrastructure.

Here's what you need to know about the discovery of the first self-replicating npm worm, which compromised packages with cloud token-stealing malware.

While security defenders welcomed the new vulnerability-validation tool, others stress it can be just as useful for would-be attackers.

As the development community chalks up the npm worm as just another bad day, bigger questions remain about the software supply chain ecosystem.

AI coding and other modern development practices mean flawed code will continue to ship. Here are key recommendations for managing software risk.

The new guidance would raise the bar for software vendors, who will need to ensure the SBOMs they generate are more detailed and machine-readable.

If you train ML models, they can learn to write more secure code. But the quality of the training data is only as good as your AppSec tooling.

CSA’s AI Controls Matrix can help development and AppSec teams distill priorities for securing the AI software supply chain.

The new procurement tool seeks to strengthen third-party software risk management (TPSRM). But the process is manual and cumbersome.

Learn how ActiveState and ReversingLabs integration automates secure component sourcing, secure software releases, remediation guidance, and policy enforcement.

RL’s Ransomware Feed data from the first half of the year shows a jump in early-stage threats like infostealers — and a drop in Trojans.

A phishing campaign against maintainers resulted in malware distribution via Javascript in top open-source packages.

With attacks on popular repositories on the rise, PyPI has moved to head off a common technique for duping developers. Here’s what it accomplishes — and where there’s room for improvement.

RL discovered how the crypto contracts were abused — and how this incident is tied to a larger campaign to promote malicious packages on top repositories.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial