
HPE, Microsoft breach disclosures mark new era of CISO accountability
New revelations show Russia’s SVR has stepped up cyber-espionage. They also spotlight how public companies are on the hook with the SEC’s disclosure laws.

New revelations show Russia’s SVR has stepped up cyber-espionage. They also spotlight how public companies are on the hook with the SEC’s disclosure laws.

ReversingLabs researchers found two suspicious npm packages that demonstrate how GitHub is increasingly being used to easily deploy malware in novel ways.

Here are the key takeaways from the threat research — and why you need to evolve your application security approach with complex binary analysis and reproducible builds.

The Sunburst hack of SolarWinds put software supply chain attacks on everyone’s radar. But they aren’t new. Here’s an abbreviated history of key attacks and compromises.

ReversingLabs has released its annual report covering the state of software supply chain security. Learn top trends and get unique insights.

To cope in a new era of software supply chain attacks, application security must make a giant leap forward to modern practices and tooling.

Here’s an overview of the key product updates to ReversingLabs malware analysis and threat hunting solutions from 2023.

Here's what you need to know about Zoom's Vulnerability Impact Scoring System, how it compares to EPSS — and how it can advance your application security.

Enhancing Endpoint Visibility: Leveraging Advanced File Intelligence to Uncover Evasive Threats

The government added important new guidance in 2023. Get up to speed — and see our interactive timeline of recent attacks to stay ahead of them in 2024.

Here's why organizations are struggling with TPCRM — and how to develop an effective program.

The analyst firm Gartner® released a new report on software supply chain risk that recommends identification of malware or malicious code.

The TeamCity incident is similar to SunBurst, which was behind the attack on SolarWinds. But there are differences. Here are tips to help secure your software pipeline.
.webp&w=3840&q=75)
To advance the state of software supply chain security and better mitigate risk, the Enduring Security Framework group has highlighted the need for binary analysis and reproducible builds.

Cross-Platform Threats: Leveraging YARA to Identify BiBi Wiper on Linux and Windows Systems
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial