
What an SBOM is — and why it matters
Software bills of materials have become key to mitigating software threats. Here's what you need to know — and how to put them to work.

Software bills of materials have become key to mitigating software threats. Here's what you need to know — and how to put them to work.

With software supply chain attacks ramping up, software bills of materials (SBOMs) are getting the nod from both government and industry experts as a "no brainer."

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of cybersecurity.

Toyota stands accused of lax DevOps standards, as the company reveals it stored prod database credentials in a public GitHub repo. That’s bad enough, but it also took five years to detect and fix.

A PHP repository vulnerability threatened millions of sites. Here's why you need to make an SBOM the first step in your software supply chain security journey.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The chatter around the Rust language is growing into a deafening roar.

We've updated our threat analysis and hunting solution, which provides automated reverse engineering and malware hunting

With third-party sources — and supply chain attacks surging — Gartner expects adoption of SBOMs to go from less than 5% now to 60% in 2025

Welcome to the latest edition of The Week in Security, which brings you the most important headlines from the world and our team across the full stack of security: application security, cybersecurity, and beyond.

The security of the Border Gateway Protocol (BGP) is laughable. But we all rely on it every day. For everything.

Discrepancies in reports to the national vulnerability databases (NVD) show the U.S. lags behind China, exposing U.S. firms to cyber attacks.

ReversingLabs’ YARA detection rule for Nokoyawa can help you find this ransomware in your environment.

The shift to remote work punched holes in government networks. But it also fostered a transformation in public-private cooperation, one NSA official noted at LABScon.

ReversingLabs has discovered a malicious npm package disguised as the software tool Material Tailwind. Here's an in-depth look at our discovery — and threat analysis.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial