RL Blog
introducing malware detection suite
April 30, 2024

Introducing the Unified RL Spectra Suite

RL announced the Spectra Advanced File Analysis and Malware Detection suite, a strategic update of our malware analysis and threat hunting solutions for advanced file analysis and threat detection. Here’s what you need to know.

Read More about Introducing the Unified RL Spectra Suite
Introducing the Unified RL Spectra Suite
three panelists on virtual event card
April 25, 2024

How NIST and C-SCRM help manage software supply chain risk

Cybersecurity Framework 2.0 includes measures for C-SCRM, a NIST program for improving software risk management. Get key insights from our Webinar.

Read More about How NIST and C-SCRM help manage software supply chain risk
How NIST and C-SCRM help manage software supply chain risk
What’s hot at RSAC 2024: 7 must-see talks for security operations teams
April 24, 2024

What’s hot at RSAC 2024: 7 must-see talks for security operations teams

If you’re a SecOps professional heading to RSA Conference 2024, make your time count by attending these essential talks.

Read More about What’s hot at RSAC 2024: 7 must-see talks for security operations teams
What’s hot at RSAC 2024: 7 must-see talks for security operations teams
red word malware written between binary code
April 23, 2024

NVD delays highlight vulnerability management woes: Put malware first

Here's what changes to the National Vulnerability Database mean for vulnerability management — and why you should instead focus on malware and tampering.

Read More about NVD delays highlight vulnerability management woes: Put malware first
NVD delays highlight vulnerability management woes: Put malware first
hand holding up a block with the word evolve on it
April 18, 2024

OWASP looks to future-proof software bills of materials with CycloneDX 1.6

The foundation is upgrading the standard for the quantum era, adding ML-readable attestation and more. Here's how it boosts software supply chain security.

Read More about OWASP looks to future-proof software bills of materials with CycloneDX 1.6
OWASP looks to future-proof software bills of materials with CycloneDX 1.6
Where GenAI intersects with threat modeling: 3 key benefits for AppSec
April 17, 2024

Where GenAI intersects with threat modeling: 3 key benefits for AppSec

Generative AI can ease the burdens of threat modeling — and speed it up. But it's not a panacea. Here's what security teams can realistically expect.

Read More about Where GenAI intersects with threat modeling: 3 key benefits for AppSec
Where GenAI intersects with threat modeling: 3 key benefits for AppSec
typewriter spelling out action items
April 16, 2024

OWASP's LLM AI Security & Governance Checklist: 13 action items for your team

The new checklist is organized into 13 areas of analysis. Here's what your security team needs to know about the most important points from each area.

Read More about OWASP's LLM AI Security & Governance Checklist: 13 action items for your team
OWASP's LLM AI Security & Governance Checklist: 13 action items for your team
XZ Trojan highlights software supply chain risk posed by 'sock puppets'
April 11, 2024

XZ Trojan highlights software supply chain risk posed by 'sock puppets'

There is no foolproof method to identify phony developer accounts — but there are telltale signs. Threat researchers share three.

Read More about XZ Trojan highlights software supply chain risk posed by 'sock puppets'
XZ Trojan highlights software supply chain risk posed by 'sock puppets'
The state of secrets security: 7 action items for better managing risk
April 10, 2024

The state of secrets security: 7 action items for better managing risk

The Circle CI breach put secrets security front of mind. Now AI and low-code are introducing more risk. Here are key takeaways for managing secrets risk.

Read More about The state of secrets security: 7 action items for better managing risk
The state of secrets security: 7 action items for better managing risk
wooden letter blocks spelling perfect storm
April 9, 2024

When GenAI and low-code collide: What could go wrong for AppSec?

Here's why the duo results in a perfect storm, key considerations — and expert advice on how engineering and application security teams can tackle the problem.

Read More about When GenAI and low-code collide: What could go wrong for AppSec?
When GenAI and low-code collide: What could go wrong for AppSec?
pixelated initials RHA
April 4, 2024

ReversingLabs Hashing Algorithm

Here's what you need to know about RL's predictive malware detection.

Read More about ReversingLabs Hashing Algorithm
ReversingLabs Hashing Algorithm
red pixelated blocks flying out of computer monitor screen
April 3, 2024

Malicious helpers: VS Code Extensions observed stealing sensitive information

Two newly discovered extensions on the VS Code Marketplace are designed to steal sensitive information, showing that open source attacks are expanding.

Read More about Malicious helpers: VS Code Extensions observed stealing sensitive information
Malicious helpers: VS Code Extensions observed stealing sensitive information
locks on metal bars protecting door
April 2, 2024

To better manage risk, make your software bills of materials actionable

Software complexity is growing — making SBOMs a necessity. But they need to be actionable to manage risk. Here's how to put them to work.

Read More about To better manage risk, make your software bills of materials actionable
To better manage risk, make your software bills of materials actionable
wooden trojan horse replica
April 1, 2024

A software supply chain meltdown: What we know about the XZ Trojan

Software tampering and social engineering were used in a months-long campaign to plant malicious code in major Linux distributions. Here's what we know.

Read More about A software supply chain meltdown: What we know about the XZ Trojan
A software supply chain meltdown: What we know about the XZ Trojan
number 30 painted inside a circle on concrete
March 27, 2024

30 SSCS statistics that matter for software security teams

Understand the state of software supply chain security with key takeaways from recent research and surveys of application security and development pros.

Read More about 30 SSCS statistics that matter for software security teams
30 SSCS statistics that matter for software security teams
Previous1...212223...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu