RL Blog
hand holding up a block with the word evolve on it
January 17, 2024

GitHub Actions hack bolsters case for complex binary analysis

Here are the key takeaways from the threat research — and why you need to evolve your application security approach with complex binary analysis and reproducible builds.

Read More about GitHub Actions hack bolsters case for complex binary analysis
GitHub Actions hack bolsters case for complex binary analysis
collage of historical pictures and artifacts
January 16, 2024

SSCS attacks: A (partial) history

The Sunburst hack of SolarWinds put software supply chain attacks on everyone’s radar. But they aren’t new. Here’s an abbreviated history of key attacks and compromises.

Read More about SSCS attacks: A (partial) history
SSCS attacks: A (partial) history
Key takeaways from the 2024 State of SSCS Report
January 16, 2024

Key takeaways from the 2024 State of SSCS Report

ReversingLabs has released its annual report covering the state of software supply chain security. Learn top trends and get unique insights.

Read More about Key takeaways from the 2024 State of SSCS Report
Key takeaways from the 2024 State of SSCS Report
Evolution of AppSec: 4 requirements for the software supply chain security era
January 11, 2024

Evolution of AppSec: 4 requirements for the software supply chain security era

To cope in a new era of software supply chain attacks, application security must make a giant leap forward to modern practices and tooling.

Read More about Evolution of AppSec: 4 requirements for the software supply chain security era
Evolution of AppSec: 4 requirements for the software supply chain security era
red and green vials with insect and plant specimens
January 10, 2024

2023 Updates in Review: Malware Analysis and Threat Hunting

Here’s an overview of the key product updates to ReversingLabs malware analysis and threat hunting solutions from 2023.

Read More about 2023 Updates in Review: Malware Analysis and Threat Hunting
2023 Updates in Review: Malware Analysis and Threat Hunting
Pressure gauge with raising needle
January 9, 2024

Zoom joins the vulnerability fray: Will VISS move the needle on AppSec?

Here's what you need to know about Zoom's Vulnerability Impact Scoring System, how it compares to EPSS — and how it can advance your application security.

Read More about Zoom joins the vulnerability fray: Will VISS move the needle on AppSec?
Zoom joins the vulnerability fray: Will VISS move the needle on AppSec?
laptop screen with green shield checkmark being labelled as malicious
January 4, 2024

How SOC analysts and threat hunters can expose malware undetected by EDR

Enhancing Endpoint Visibility: Leveraging Advanced File Intelligence to Uncover Evasive Threats

Read More about How SOC analysts and threat hunters can expose malware undetected by EDR
How SOC analysts and threat hunters can expose malware undetected by EDR
timeline of federal guidance on software supply chain security white house electric tower
January 4, 2024

A definitive guide: Federal software supply chain security initiatives

The government added important new guidance in 2023. Get up to speed — and see our interactive timeline of recent attacks to stay ahead of them in 2024.

Read More about A definitive guide: Federal software supply chain security initiatives
A definitive guide: Federal software supply chain security initiatives
wooden blocks with letters spelling risk
January 2, 2024

Key reasons third-party cyber risk management programs fail

Here's why organizations are struggling with TPCRM — and how to develop an effective program.

Read More about Key reasons third-party cyber risk management programs fail
Key reasons third-party cyber risk management programs fail
get our key takeaways title card gartner report
January 1, 2024

Gartner® report addresses SSCS risks

The analyst firm Gartner® released a new report on software supply chain risk that recommends identification of malware or malicious code.

Read More about Gartner® report addresses SSCS risks
Gartner® report addresses SSCS risks
big pipeline with red shutoff valve
December 21, 2023

The JetBrains TeamCity software supply chain attack: Lessons learned

The TeamCity incident is similar to SunBurst, which was behind the attack on SolarWinds. But there are differences. Here are tips to help secure your software pipeline.

Read More about The JetBrains TeamCity software supply chain attack: Lessons learned
The JetBrains TeamCity software supply chain attack: Lessons learned
malware written in red in between binary code
December 20, 2023

ESF steps up supply chain security guidance with call for binary analysis

To advance the state of software supply chain security and better mitigate risk, the Enduring Security Framework group has highlighted the need for binary analysis and reproducible builds.

Read More about ESF steps up supply chain security guidance with call for binary analysis
ESF steps up supply chain security guidance with call for binary analysis
detecting bibi wiper
December 20, 2023

From the Labs: YARA Rule for Detecting BiBi Wiper

Cross-Platform Threats: Leveraging YARA to Identify BiBi Wiper on Linux and Windows Systems

Read More about From the Labs: YARA Rule for Detecting BiBi Wiper
From the Labs: YARA Rule for Detecting BiBi Wiper
abstract cityscape
December 19, 2023

Malware leveraging public infrastructure like GitHub on the rise

ReversingLabs researchers have uncovered two novel techniques running on GitHub — one abusing GitHub Gists, another issuing commands through git commit messages.

Read More about Malware leveraging public infrastructure like GitHub on the rise
Malware leveraging public infrastructure like GitHub on the rise
green robot turned facing different way amidst a bunch of pink robots
December 14, 2023

The Hugging Face API token breach: 5 lessons learned

More than 1,500 tokens were exposed, leaving millions of AI models and datasets vulnerable. Here's what your security team can learn from the compromise.

Read More about The Hugging Face API token breach: 5 lessons learned
The Hugging Face API token breach: 5 lessons learned
Previous1...242526...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu