
Breaking the UEFI firmware Authenticode security model
Blog 8 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the UEFI firmware Authenticode security modelBlog 8 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the UEFI firmware Authenticode security modelBlog 7 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the Windows Authenticode security modelBlog 9 in series: Digital Certificates - Models for Trust and Targets for Misuse
Read More about Breaking the Linux Authenticode security modelRocking the foundations of a trust-based digital code signing system
Read More about Breaking the Microsoft Authenticode security modelEnterprise software development graduated from the “waterfall” framework of development and operations - and became less linear, more complex and, in several ways, more difficult to secure. And while contemporary software supply chain practices allow developers to manage that complexity and deliver software efficiently at scale, unaddressed gaps and vulnerabilities within the process continue to be exploited by threat actors.
Read More about Why You Need to Prioritize Software Development and Supply Chain SecurityRead More about How to Detect Software Supply Chain Attacks
ReversingLabs Joins Open Cybersecurity Alliance as a Founding Sponsor
Read More about Integrate Once, Reuse EverywhereRead More about Going Beyond Files: Destructive Object Analysis
Blog 6: A new kind of certificate fraud: Executive impersonation
Read More about Digital Certificates - Models for Trust and Targets for Misuse 6Read More about Mirai Botnet Continues to Plague IoT Space
Implementing Processes and Controls to Disrupt Attackers
Read More about How Existing Cybersecurity Frameworks Can Curb Supply Chain AttacksDetecting malware in package manager repositories
Read More about The NPM package that walked away with all your passwordsLast week the 22nd annual Black Hat conference hosted over 19,000 security professionals in Las Vegas.
Read More about Highlights from Black Hat USA 2019Because of a critical lack of skilled security resources and because of an overload of potential cyberattack related events, efficient operations and accurate analysis are top of mind for savvy security teams everywhere.
Read More about Top Ways to Get More Value From Your EDR...
Read More about How Detecting High Priority Malware will Accelerate Quality App Development and ReleaseGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial