
Track this: Apple, Google hit with BIG privacy law claims
Within the space of a few days, both Google and Apple have suffered huge legal challenges.

Within the space of a few days, both Google and Apple have suffered huge legal challenges.

New malware appears or evolves daily, so updating tools like YARA rules for detection is critical. Here's how my research team develops YARA rules.

ReversingLabs’ YARA detection rule for GwisinLocker can help you find this ransomware in your environment.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Dropbox was hacked last month. The company has now revealed more details — and there are some big surprises.
-1-1400x732.jpg&w=3840&q=75)
The Forrester Security & Risk Forum tool place this week in Washington D.C. with a full agenda, tackling a range of issues, from the cyber implications of geopolitical disruptions to the privacy and security implications of the Metaverse.

ReversingLabs’ YARA detection rule for LockBit can help you detect this malicious ransomware in your environment. We break it down for you here.
.webp&w=3840&q=75)
Our customers rely on ReversingLabs Elastic Threat Infrastructure (TitaniumScale) to quickly scan large volumes of files to identify malware and goodware. Here, we break down the solution’s newest improvements.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Security operations centers (SOCs) and developers need to share the responsibility for securing the software supply chain. Find out why in ReversingLabs' latest report.

Once again, Microsoft is under fire for shipping a service that can easily be misused for DDoS attacks.

Chris Inglis said the government is setting a new bar for supply chain security as the national cybersecurity focus shifts from incident response to cyber resilience.

After two decades of raising awareness about the big problems in application security, the Open Web Application Security Project (OWASP) stands at a crossroads.

Welcome to the latest edition of The Week in Security, which brings you top stories from both the world and our team, across the full stack of security: software security, cybersecurity, and beyond.

Google is putting its weight behind a project to offer a comprehensive view of your software. Enter GUAC: Graph for Understanding Artifact Composition.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial