
Track this: Apple, Google hit with BIG privacy law claims
Within the space of a few days, both Google and Apple have suffered huge legal challenges.
Read More about Track this: Apple, Google hit with BIG privacy law claimsWithin the space of a few days, both Google and Apple have suffered huge legal challenges.
Read More about Track this: Apple, Google hit with BIG privacy law claimsNew malware appears or evolves daily, so updating tools like YARA rules for detection is critical. Here's how my research team develops YARA rules.
Read More about How to write detailed YARA rules for malware detectionReversingLabs’ YARA detection rule for GwisinLocker can help you find this ransomware in your environment.
Read More about From the Labs: YARA Rule for Detecting GwisinLockerWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: Former Uber CSO convicted over hack cover-up, supply chain attack targets mediaDropbox was hacked last month. The company has now revealed more details — and there are some big surprises.
Read More about Dropbox reveals hack: What DevOps can learn from itThe Forrester Security & Risk Forum tool place this week in Washington D.C. with a full agenda, tackling a range of issues, from the cyber implications of geopolitical disruptions to the privacy and security implications of the Metaverse.
Read More about Forrester Security & Risk Forum: Go beyond the software bill of materialsReversingLabs’ YARA detection rule for LockBit can help you detect this malicious ransomware in your environment. We break it down for you here.
Read More about From the Labs: YARA Rule for Detecting LockBitOur customers rely on ReversingLabs Elastic Threat Infrastructure (TitaniumScale) to quickly scan large volumes of files to identify malware and goodware. Here, we break down the solution’s newest improvements.
Read More about Meet the Latest Update to ReversingLabs Elastic Threat InfrastructureWelcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: OpenSSL danger downgraded but still real, GitHub exposedSecurity operations centers (SOCs) and developers need to share the responsibility for securing the software supply chain. Find out why in ReversingLabs' latest report.
Read More about Special report: End-to-end supply chain security demands dev and SOC teams shift left togetherOnce again, Microsoft is under fire for shipping a service that can easily be misused for DDoS attacks.
Read More about Reflection attacks: Don’t be part of the problemChris Inglis said the government is setting a new bar for supply chain security as the national cybersecurity focus shifts from incident response to cyber resilience.
Read More about National Cyber Director: Higher bar for software supply chain security is key to cyber resilienceAfter two decades of raising awareness about the big problems in application security, the Open Web Application Security Project (OWASP) stands at a crossroads.
Read More about OWASP at a crossroads: Founder Mark Curphey's call for relevance in the age of DevSecOpsWelcome to the latest edition of The Week in Security, which brings you top stories from both the world and our team, across the full stack of security: software security, cybersecurity, and beyond.
Read More about The Week in Security: Pro-China cyber operation Dragonbridge targets U.S. electionsGoogle is putting its weight behind a project to offer a comprehensive view of your software. Enter GUAC: Graph for Understanding Artifact Composition.
Read More about Google pairs GUAC with SLSA to take a bite out of software supply chain insecurityGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial