
GwisinLocker ransomware targets South Korean industrial and pharma firms
...

...

As the ReveringLabs team embraces the Black Hat USA conference in Las Vegas this week, we wanted to share some exciting news that will be vital to the company’s ongoing growth: Ali Khan has been named ReversingLabs’ first-ever Field CISO.

A new Chinese offensive framework may be abused by threat actors, hackers steal $190 million from Nomad Token Bridge, and more.

Black Hat is set to return next week with two years of pent up cybersecurity research and discoveries. Here are the talks you don't want to miss.

software-supply-chain-security-takes-center-stage-at-black-hat-2022

Here is a run-down of the 10 streams from OpenSSF's Open Source Software Security Mobilization Plan.

Updates include: Improved static analysis, improved integrations and automation, smoother workflows for a better user experience, and ease of administration.

An analysis of three in-the-wild payloads delivered using the recently discovered Follina exploit shows how attackers can use it to achieve persistent access in victim environments and turbo-charge efforts to ‘live off the land’ and avoid detection by security monitoring tools.

Better threat hunting and investigations with flexibility in threat status classifications, reliable dynamic and network analysis, and smoother workflows and maintenance.

Cozy Bear APT group is using Dropbox and Google drive to cover up attacks, malware is spreading via Google Play Store apps, and more.

More than 30 years after the AIDS computer virus spread via infected floppy disks, ransomware has taken the world by storm. But echoes of that first attack can still be heard today.

A survey of the post-Log4j landscape found few successful hacks linked to it. The bad news? Log4Shell will linger for years — so you need to prepare.

A new attack known as ‘Retbleed’ impacts microprocessors, journalists are becoming desirable targets for cybercriminals, and more.

Fallout from another supply chain attack involving malicious npm modules. Also: Microsoft backtracks on a pledge to disable Office macros.
ReversingLabs researchers have uncovered a widespread campaign to install malicious npm modules that are harvesting sensitive data from forms embedded in mobile apps and websites.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial