
Ransomware in exotic email attachments
Blog 3 of 5 part series on advanced research into modern phishing attacks
Read More about Ransomware in exotic email attachmentsBlog 3 of 5 part series on advanced research into modern phishing attacks
Read More about Ransomware in exotic email attachmentsCybercrime has been called "the greatest threat to every company in the world," and for good reason.
Read More about Automated Static Analysis vs. Dynamic Analysis - Better Together?Introducing our Titanium Platform with Destructive Object Insights
Read More about Visit ReversingLabs at Black Hat 2019Blog 2 of 5 part series on advanced research into modern phishing attacks
Read More about Catching deceptive links before the phishRead More about How to Prioritize High-Risk Phishing Attacks You Otherwise Miss
Malicious actors are constantly on the lookout for new attack vectors and techniques, using them to infiltrate even the most secure of organizations.
Read More about SupPy Chain Malware - Detecting malware in package manager repositoriesBlog 1 of 5 part series on advanced research into modern phishing attacks
Read More about Catching deceptive links before the clickRead More about 7 Common Mistakes to Avoid in Choosing a File Reputation Service
Malware is making it through your network. It's evading your organization's cyber defenses and impacting your business.
Read More about The Power of Automated Static AnalysisBlog 5: Subverting trust with digital counterfeits
Read More about Digital Certificates - Models for Trust and Targets for Misuse 5Blog 4: You are you, but so am I - certificate impersonation
Read More about Digital Certificates – Models for Trust and Targets for Misuse 4Tampering with signed objects without breaking the integrity seal
Read More about Digital Certificates – Models for Trust and Targets for Misuse 3Blog 2: Trust-based models in the age of supply chain attacks
Read More about Digital Certificates – Models for Trust and Targets for Misuse 2Blog 1: Building secure certificate whitelists
Read More about Digital Certificates – Models for Trust and Targets for Misuse 1Operation ShadowHammer is a new and highly targeted supply chain attack discovered by Kaspersky Lab.
Read More about Forging the ShadowHammerGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial