
CISO’s Guide to Protecting Against Modern Software Risks
How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain
Read More about CISO’s Guide to Protecting Against Modern Software Risks
The attack on SolarWinds: Next-level stealth was key
The SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.
Read More about The attack on SolarWinds: Next-level stealth was key
The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abused
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.
Read More about The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abused
Advancing the Cybersecurity Industry with the SOREL-20M Initiative
ReversingLabs and Sophos partner to bring high-quality threat intelligence to security practitioners and data scientists
Read More about Advancing the Cybersecurity Industry with the SOREL-20M Initiative
Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore
Learn more about our revised image modules
Read More about Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore
PoorWeb - Hitching a Ride on Hangul
Tearing Down HWP Files To Expose a Trojan
Read More about PoorWeb - Hitching a Ride on Hangul
Taidoor - a truly persistent threat
When malware lasts longer than your washing machine
Read More about Taidoor - a truly persistent threat
Machine Learning for Humans
Explainability. Transparency. Relevancy.
Read More about Machine Learning for Humans
Five Uses of YARA
YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.
Read More about Five Uses of YARA
Hidden Cobra - from a shed skin to the viper’s nest
Enriching public threat intelligence
Read More about Hidden Cobra - from a shed skin to the viper’s nest
Spying on SpyNet
Malware is like a constantly evolving open-source project.
Read More about Spying on SpyNet