
Go below the surface on tampering: The trouble with software integrity validation
The growing number of software supply chain attacks is putting pressure on validation of software integrity and authenticity.

The growing number of software supply chain attacks is putting pressure on validation of software integrity and authenticity.

Python packages can contain sensitive information. Here's how software development teams can keep secrets secret

Package repository content can be different from source code repository content. Here's what your software team needs to know.

Software supply chain attacks are a top concern. But tools for monitoring and stopping them lags. Meet ReversingLabs' new platform: secure.software.

Chief Information Security Officers from energy, finance, and retail sectors reflect on new security challenges–and CISO burnout.

ReversingLabs’ team of threat analysts have released new YARA detection rules for malware wipers discovered targeting Ukraine. We break them down for you here.

One year ago today, the White House released an executive order regarding improving the nation’s cybersecurity (a.k.a. EO 14028). Here's where things stand.

Research by ReversingLabs suggests that dependency confusion attacks on npm repositories have been used to compromise German firms - exposing an apparent red team exercise.

The Emotet malware is back just months after a highly publicized take-down. Dragan Damjanovic of KPMG and Dado Horvat, a Senior Threat Analyst at ReversingLabs, talk about how to keep your organization safe.

The resurgence of the Conti ransomware group in the face of leaks and takedowns is worth paying attention to -and a signal of trouble ahead for enterprises

The importance of generating SBOM data for responding to newly reported vulnerabilities and software supply chain attacks only grows.

The U.S. is raising the bar for secure software. Listen as ReversingLabs Chief Software Architect talks about what's in NIST's new Secure Software Development Framework guidance and software bills of material (SBOMs), and what they mean for your software development organization.

Ukrainian organizations have been targeted by hundreds of attacks in recent weeks, including two new examples of destructive wiper malware. We take a closer look at HermeticWiper and IsaacWiper.

Early Stage Ransomware Intelligence is crucial to preventing ransomware attacks before they happen.

The government’s standards body issued guidelines for secure development, asking firms selling to the government to implement a software bill of materials.
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial