
TitaniumCloud app for Splunk SOAR updated
Version 1.2.0 of ReversingLabs' TitaniumCloud v2 app for Splunk SOAR adds new actions for network reputation lookups.
Read More about TitaniumCloud app for Splunk SOAR updatedVersion 1.2.0 of ReversingLabs' TitaniumCloud v2 app for Splunk SOAR adds new actions for network reputation lookups.
Read More about TitaniumCloud app for Splunk SOAR updatedSBOMs are essential — but making them useful in CI/CD environments is tricky. Here are 5 key best practices.
Read More about 5 best practices for securing your CI/CD with software bills of materialsReversingLabs has highlighted threats in npm, PyPI and RubyGEMS in recent years. This finding shows NuGet is equally exposed to malicious activities by threat actors.
Read More about IAmReboot: Malicious NuGet packages exploit loophole in MSBuild integrationsThe OpenSSF's Secure Supply Chain Consumption Framework can be used to better discover the risks of open-source components — but remediation is left for organizations to figure out later.
Read More about How mature is your open-source risk management? S2C2F helps map dependenciesApplication security veterans Mark Curphey and John Viega went on a CISO listening tour. Here's what they learned.
Read More about App sec prioritization is priority No. 1 for CISOsExtending validity checks is welcome, but secrets risk is bigger than that — and requires a holistic supply chain security approach.
Read More about GitHub boosts secrets scanning: A necessary step, but supply chain security is key to managing riskExtending the language's bare-metal use from Linux will make Android a trusted platform — and have a broader impact on the Rust development community.
Read More about Rust on Android goes bare metal: 3 key security benefitsHere's why application programming interface security is critical to risk management — and the advances needed to move API security forward.
Read More about Are APIs the weak link in your supply chain security?What’s to come for the security of open source software? ConversingLabs caught up with Mikaël Barbero of the Eclipse Foundation to answer that question. Watch (or listen) and learn.
Read More about The state of OSS security: Changes in attack methods, policyReversingLabs discovered that one “s” was all that separated a legit npm package from a malicious twin that delivered the r77 rootkit — and was downloaded more than 700 times.
Read More about Typosquatting campaign delivers r77 rootkit via npmVersion 8.3 of RL's A1000 Malware Analysis Platform delivers better visuals, search, and an improved cloud sandbox. Here are all of the updates.
Read More about ReversingLabs A1000 Threat Analysis and Hunting Solution Update Drives SecOps ForwardNIST's new guidelines are welcome, but some organizations may find it challenging to put them into practice.
Read More about NIST supply chain security guidance for CI/CD environments: What you need to knowNIST's new guidelines are welcome, but some organizations may find it challenging to put them into practice.
Read More about NIST supply chain security guidance for CI/CD environments: What you need to knowRansomware-as-a-service gang ALPHV (a.k.a. BlackCat) carried out a sophisticated attack on the hotel and casino company MGM. Here’s what the ReversingLabs threat team understands.
Read More about BlackCat (ALPHV): What we know about the MGM hackKandji Director of Threat Intelligence Devin Byrd talks about the growing enterprise threats to macOS and iOS endpoints.
Read More about With growing threats to Apple devices, Kandji ramps upGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial