
CISO’s Guide to Protecting Against Modern Software Risks
How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain

The attack on SolarWinds: Next-level stealth was key
The SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.

The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abused
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Advancing the Cybersecurity Industry with the SOREL-20M Initiative
ReversingLabs and Sophos partner to bring high-quality threat intelligence to security practitioners and data scientists

Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore
Learn more about our revised image modules

PoorWeb - Hitching a Ride on Hangul
Tearing Down HWP Files To Expose a Trojan

Taidoor - a truly persistent threat
When malware lasts longer than your washing machine

Five Uses of YARA
YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.

Hidden Cobra - from a shed skin to the viper’s nest
Enriching public threat intelligence





