
From the Labs: YARA Rule for Detecting GoodWill
ReversingLabs’ YARA detection rule for GoodWill can help you find this ransomware in your environment.

ReversingLabs’ YARA detection rule for GoodWill can help you find this ransomware in your environment.

In our latest episode of the ConversingLabs podcast, host Paul Roberts interviews ReversingLabs researcher Joseph Edwards about his analysis of Follina, a newly discovered exploit with a pretty name, but nasty intentions.

Vice Society ransomware group targets America’s education sector, the U.S. government’s new position on software supply chain security, and more.

New federal guidance codifies lessons from the SolarWinds hack, including for securing third-party code and development pipelines. A software bill of materials (SBOM) is central. Here are four key takeaways.

ReversingLabs’ open source YARA detection rule for Blue Locker can help you find this ransomware in your environment.

Software bills of materials will never be a panacea for software supply chain security. Here are key trends that will deliver some welcome evolution, however.

ReversingLabs’ YARA detection rule for Acepy can help you find this ransomware in your environment.

A China-linked cyber espionage campaign targets critical entities in Australia and the South China Sea, password manager LastPass gets hacked (again), and more

After a recent discovery of malicious PyPI packages, questions remain about the security community’s ability to mitigate threats posed to open source repositories.

Cybercriminals are continuing to target medical facilities, Twitter’s alleged lack of cybersecurity measures, and more.


A presentation at the Black Hat Briefings in Las Vegas dug into the “how” of CI/CD compromises. As it turns out, many of the culprits will be familiar to security teams.

The National Vulnerability Database represents a minority of software supply chain threats. With attacks surging, teams must shift focus from vulnerabilities to malware.

Evidence has surfaced of cybercrime’s fast-paced growth in 2022, a new Google Chrome zero-day vulnerability is being exploited, and more.

Few need to be reminded of the fears that the Colonial Pipeline hack caused in May of 2021, in which airlines scrambled to keep their planes fueled for long-haul flights and Americans across the eastern seaboard panic-bought gas in expectation of supply disruptions.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial