
Dropbox reveals hack: What DevOps can learn from it
Dropbox was hacked last month. The company has now revealed more details — and there are some big surprises.

Dropbox was hacked last month. The company has now revealed more details — and there are some big surprises.
-1-1400x732.jpg&w=3840&q=75)
The Forrester Security & Risk Forum tool place this week in Washington D.C. with a full agenda, tackling a range of issues, from the cyber implications of geopolitical disruptions to the privacy and security implications of the Metaverse.

ReversingLabs’ YARA detection rule for LockBit can help you detect this malicious ransomware in your environment. We break it down for you here.
.webp&w=3840&q=75)
Our customers rely on ReversingLabs Elastic Threat Infrastructure (TitaniumScale) to quickly scan large volumes of files to identify malware and goodware. Here, we break down the solution’s newest improvements.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Security operations centers (SOCs) and developers need to share the responsibility for securing the software supply chain. Find out why in ReversingLabs' latest report.

Once again, Microsoft is under fire for shipping a service that can easily be misused for DDoS attacks.

Chris Inglis said the government is setting a new bar for supply chain security as the national cybersecurity focus shifts from incident response to cyber resilience.

After two decades of raising awareness about the big problems in application security, the Open Web Application Security Project (OWASP) stands at a crossroads.

Welcome to the latest edition of The Week in Security, which brings you top stories from both the world and our team, across the full stack of security: software security, cybersecurity, and beyond.

Google is putting its weight behind a project to offer a comprehensive view of your software. Enter GUAC: Graph for Understanding Artifact Composition.

Here's what you need to know about the state of CI/CD tools — and why you need to upgrade your tools and approach to deliver secure software at speed.

Here's what to focus on for a comprehensive approach to application security across your entire software development pipeline.

The medical device sector is under pressure to improve software supply chain security, and software bills of materials (SBOMs) are front and center. ReversingLabs talks with Professor Kevin Fu of the Archimedes Center at University of Michigan about what to expect.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial