
It only takes one line of code to ruin your day
They say there’s no such thing as bad press, but getting name recognition for a data breach never feels good. Enter Codecov.

They say there’s no such thing as bad press, but getting name recognition for a data breach never feels good. Enter Codecov.

Relying on legacy functionalities comes with inherent security risks

One of the core tenets of computer science is code reuse.


How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain

The SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

ReversingLabs and Sophos partner to bring high-quality threat intelligence to security practitioners and data scientists

Learn more about our revised image modules

Tearing Down HWP Files To Expose a Trojan

When malware lasts longer than your washing machine
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial