
From the Labs: YARA Rule for Detecting HermeticRansom
The ReversingLabs YARA detection rule for HermeticRansom can help you find this ransomware in your environment.
Read More about From the Labs: YARA Rule for Detecting HermeticRansomThe ReversingLabs YARA detection rule for HermeticRansom can help you find this ransomware in your environment.
Read More about From the Labs: YARA Rule for Detecting HermeticRansomCISA hosted SBOM-a-rama on Wednesday to move software bills of material — a list of ingredients for software and services — forward. Here are top takeaways and insights.
Read More about CISA SBOM-a-rama tackles challenges: 5 key takeawaysWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: Ukraine APT attacks tied to Russia, critical eye placed on AI-generated softwareConversingLabs caught up with Srinivasan to discuss how OpenSSF's Security Scorecard can aid developers in assessing open source software components for their projects.
Read More about How to trust open source software: A conversation with OpenSSF's Naveen SrinivasanBad actors are finding secrets across the supply chain. Here are the key attack methods — and what's needed to prevent them.
Read More about How hackers access secretsCl0p quietly tested the flaw for two years before launching the full exploit. Lesson: Look both ways before crossing.
Read More about MOVEit software exploit walks before it runsSoftware vendors that do business with the government must prove they are practicing basic supply chain security. Here's a rundown on the requirements.
Read More about Self-attestation on software security: What development teams need to knowFirmware attacks can pose a substantial risk to the software supply chain. Here's what your software security team can learn from the latest compromise.
Read More about The Gigabyte firmware backdoor: Lessons learned about supply chain securityWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: AI hallucinations linked to software supply chain risk, CI fix deemed criticalReversingLabs Field CISO Matt Rose explains the difference between application security hacks and software supply chain hacks.
Read More about What's the difference between app sec and supply chain security? It's all in the hackCompiled-code behavior analysis beats old-skool app sec tools.
Read More about PyPI hackers code sneaky new tactic. Researchers caught 'em red handedYour security operations team should be planning how to stay ahead of these emerging AI risks.
Read More about 5 AI threats keeping SOC teams up at nightConversingLabs caught up with Chris Romeo of Kerr Ventures at RSA Conference 2023 to talk about the state of application security. Watch (or listen) — and learn.
Read More about The state of app sec with Chris Romeo: The year of the application is nearWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security
Read More about The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existentialThe ReversingLabs research team has identified a novel attack on PyPI using compiled Python code to evade detection — possibly the first attack to take advantage of PYC file direct execution.
Read More about When byte code bites: Who checks the contents of compiled Python files?Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial