
DevOps teams: BGP security is BAD. But you can fix it
The security of the Border Gateway Protocol (BGP) is laughable. But we all rely on it every day. For everything.
Read More about DevOps teams: BGP security is BAD. But you can fix itThe security of the Border Gateway Protocol (BGP) is laughable. But we all rely on it every day. For everything.
Read More about DevOps teams: BGP security is BAD. But you can fix itDiscrepancies in reports to the national vulnerability databases (NVD) show the U.S. lags behind China, exposing U.S. firms to cyber attacks.
Read More about Gaps in the NVD increase U.S. cyber threatReversingLabs’ YARA detection rule for Nokoyawa can help you find this ransomware in your environment.
Read More about From the Labs: YARA Rule for Detecting NokoyawaThe shift to remote work punched holes in government networks. But it also fostered a transformation in public-private cooperation, one NSA official noted at LABScon.
Read More about The pandemic turned out to be a boon for public-private cybersecurity cooperationReversingLabs has discovered a malicious npm package disguised as the software tool Material Tailwind. Here's an in-depth look at our discovery — and threat analysis.
Read More about Threat analysis: Malicious npm package mimics Material Tailwind CSS toolt’s confirmed: The Linux kernel will have Rust support soon.
Read More about Rust finds its mojo: Move forward to memory-safe codeThe famous hacking group Lapsus$ appears to be back in action. Also: Russian cyber spies are targeting Ukraine by posing as internet providers.
Read More about The Week in Security: Is Lapsus$ back in action?Selling software to the government? You must now attest to conformity with NIST standards. And SBOMs, while not required, are preferred.
Read More about White House now requires software adhere to NIST standardsRead More about Iran-backed APT actors utilize CVEs to carry out cyber attacks on critical infrastructure
A new U.S. federal government memo mandates the federal use of secure third-party software products and services. Also, Twitter whistleblower Mudge Zatko reveals new details of the company’s security practices (or lack thereof) with Congress.
Read More about The Week in Cybersecurity: U.S. mandates federal agencies use secure third-party software toolsPeiter “Mudge” Zatko (pictured) was grilled by U.S. senators this week. Twitter’s former head of security has some damning things to say about the service’s DevOps security — or lack of it.
Read More about Why Twitter security sucks: Half of staff has PII accessHere's what you need to know about the new OpenSSF npm security best practices.
Read More about OpenSSF's npm best practices: A solid first step for supply chain security — but trust issues remainReversingLabs’ YARA detection rule for GoodWill can help you find this ransomware in your environment.
Read More about From the Labs: YARA Rule for Detecting GoodWillIn our latest episode of the ConversingLabs podcast, host Paul Roberts interviews ReversingLabs researcher Joseph Edwards about his analysis of Follina, a newly discovered exploit with a pretty name, but nasty intentions.
Read More about ConversingLabs: Unpacking the Follina exploitVice Society ransomware group targets America’s education sector, the U.S. government’s new position on software supply chain security, and more.
Read More about The Week in Cybersecurity: Vice Society ransomware group targets back-to-schoolGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial