
ZetaNile: Open source software trojans from North Korea
ReversingLabs Malware Researcher Joseph Edwards takes a deep dive into ZetaNile, a set of open-source software trojans being used by Lazarus/ZINC.

ReversingLabs Malware Researcher Joseph Edwards takes a deep dive into ZetaNile, a set of open-source software trojans being used by Lazarus/ZINC.


Software supply chain attacks are on the rise because of their reach. Here are 10 valuable lessons from the recent GitHub namespace attack.

A rash of small businesses on Facebook found their accounts locked after being hacked. And it’s impossible to contact Meta to get the problem fixed.

GitOps can help control configuration drift and enable your infrastructure security to shift left, for starters. Here are four ways it can enable better software security.

ReversingLabs Cloud Deep Scan can help organizations quickly identify threats in their AWS file shares and storage. Here are the key features.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Within the space of a few days, both Google and Apple have suffered huge legal challenges.

New malware appears or evolves daily, so updating tools like YARA rules for detection is critical. Here's how my research team develops YARA rules.

ReversingLabs’ YARA detection rule for GwisinLocker can help you find this ransomware in your environment.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Dropbox was hacked last month. The company has now revealed more details — and there are some big surprises.
-1-1400x732.jpg&w=3840&q=75)
The Forrester Security & Risk Forum tool place this week in Washington D.C. with a full agenda, tackling a range of issues, from the cyber implications of geopolitical disruptions to the privacy and security implications of the Metaverse.

ReversingLabs’ YARA detection rule for LockBit can help you detect this malicious ransomware in your environment. We break it down for you here.
.webp&w=3840&q=75)
Our customers rely on ReversingLabs Elastic Threat Infrastructure (TitaniumScale) to quickly scan large volumes of files to identify malware and goodware. Here, we break down the solution’s newest improvements.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial