
From the Labs: YARA Rule for Detecting StealC
Tracking StealC's Rise: How YARA Rules Help Uncover a New Breed of Information Stealers

Tracking StealC's Rise: How YARA Rules Help Uncover a New Breed of Information Stealers

“Write once, infect everywhere” might be the new cybercrime motto, with newly discovered campaigns showing malicious npm packages powering phishing kits and supply chain attacks.
.webp&w=3840&q=75)
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Here's how to use basic HTML to dress up your security incidents

C’mon, dev teams — it's about time to get serious about memory safety, XSS and SQLi.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

It’s a dog-eat-dog world ... Bug allows bad actor to manipulate URLs and extract data. Note to devs: Avoid consecutive object references and add entropy.

Hackers are having a field day targeting developers with supply chain attacks, which open doors to other compromises. Here's why — and what to do about it.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Forward-thinking DevOps shops are doing it already. Isn’t it time your team got on board?

Robert Martin of MITRE and Cassie Crossley of Schneider Electric discuss how MITRE’s System of Trust helps operationalize software supply chain security.

From Indicators to Action: Streamlining Incident Response with Integrated Threat Intelligence in Sentinel

OWASP is expanding its Top 10 series with a list of large language model vulnerabilities. Here's what AppSec teams need to know.

The ReversingLabs YARA detection rule for HermeticRansom can help you find this ransomware in your environment.

CISA hosted SBOM-a-rama on Wednesday to move software bills of material — a list of ingredients for software and services — forward. Here are top takeaways and insights.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial