RL Blog
The Week in Cybersecurity: NATO creates cyber rapid response
June 30, 2022

The Week in Cybersecurity: NATO creates cyber rapid response

International relations intersects with cybersecurity, learn how to leverage YARA rules, plus new developments on AstraLocker 2.0.

Read More about The Week in Cybersecurity: NATO creates cyber rapid response
The Week in Cybersecurity: NATO creates cyber rapid response
SBOM Facts: Know what's in your software to fend off supply chain attacks
June 29, 2022

SBOM Facts: Know what's in your software to fend off supply chain attacks

SBOM Facts: Know what's in your software to fend off supply chain attacks

Read More about SBOM Facts: Know what's in your software to fend off supply chain attacks
SBOM Facts: Know what's in your software to fend off supply chain attacks
Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs
June 28, 2022

Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs

ReversingLabs recently discovered instances of the AstraLocker 2.0 malware distributed directly from Microsoft Word files used in phishing attacks.

Read More about Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs
Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs
The Week in Cybersecurity: Austrian hackers-for-hire KNOTWEED serve up Subzero malware
June 28, 2022

The Week in Cybersecurity: Austrian hackers-for-hire KNOTWEED serve up Subzero malware

Austrian group KNOTWEED spreads malware via Microsoft products, new malware-infested apps pop up in the Google Play store, and mo

Read More about The Week in Cybersecurity: Austrian hackers-for-hire KNOTWEED serve up Subzero malware
The Week in Cybersecurity: Austrian hackers-for-hire KNOTWEED serve up Subzero malware
Paul Robers for Conversing Labs podcast
June 23, 2022

ConversingLabs highlights: RSA Conference spotlights software supply chain, critical infrastructure risk

The RSA Conference brings some of the brightest minds in information security together in one place.

Read More about ConversingLabs highlights: RSA Conference spotlights software supply chain, critical infrastructure risk
ConversingLabs highlights: RSA Conference spotlights software supply chain, critical infrastructure risk
RSA conference zero trust roundtable event
June 14, 2022

How to build trust in a zero-trust environment: Security leaders share insights

Read More about How to build trust in a zero-trust environment: Security leaders share insights
How to build trust in a zero-trust environment: Security leaders share insights
Omer Gil and Daniel Krivelevich outlined the top CI/CD security risks at RSA Conference 2022.
June 14, 2022

5 CI/CD breaches analyzed: Why you need to update your software security

Omer Gil and Daniel Krivelevich outlined the top CI/CD security risks at RSA Conference 2022. Here's what your software security team needs to know.

Read More about 5 CI/CD breaches analyzed: Why you need to update your software security
5 CI/CD breaches analyzed: Why you need to update your software security
Survey finds software supply chain security top of mind for dev teams — but tampering detection lags
June 13, 2022

Survey finds software supply chain security top of mind for dev teams — but tampering detection lags

A survey of more than 300 technology professionals found widespread concern about supply chain attacks, but only sporadic efforts to detect such attacks.

Read More about Survey finds software supply chain security top of mind for dev teams — but tampering detection lags
Survey finds software supply chain security top of mind for dev teams — but tampering detection lags
Taking the quiz: Are you up to speed on supply chain risk?
June 8, 2022

Taking the quiz: Are you up to speed on supply chain risk?

ReversingLabs delivered a game-show style review of its survey on software supply chain security at RSA Conference. Here are the questions and answers.

Read More about Taking the quiz: Are you up to speed on supply chain risk?
Taking the quiz: Are you up to speed on supply chain risk?
MITRE’s System of Trust: A standard for software supply chain security
June 8, 2022

MITRE’s System of Trust: A standard for software supply chain security

MITRE’s System of Trust framework is aiming to standardize how software supply chain security is assessed. MITRE's Robert Martin explains.

Read More about MITRE’s System of Trust: A standard for software supply chain security
MITRE’s System of Trust: A standard for software supply chain security
What’s hot at #RSAC? Our picks for the big security show
June 3, 2022

What’s hot at #RSAC? Our picks for the big security show

It's two years in, and COVID is still threatening to steal RSA Conference's mojo. But for those willing to brave Moscone in San Francisco (and those attending virtually), you won’t be disappointed. Here are our picks for must-see talks.

Read More about What’s hot at #RSAC? Our picks for the big security show
What’s hot at #RSAC? Our picks for the big security show
Go below the surface on tampering: The trouble with software integrity validation
June 2, 2022

Go below the surface on tampering: The trouble with software integrity validation

The growing number of software supply chain attacks is putting pressure on validation of software integrity and authenticity.

Read More about Go below the surface on tampering: The trouble with software integrity validation
Go below the surface on tampering: The trouble with software integrity validation
confused armadillo looking at pypi logo
June 1, 2022

It’s not a secret if you publish it on PyPI

Python packages can contain sensitive information. Here's how software development teams can keep secrets secret

Read More about It’s not a secret if you publish it on PyPI
It’s not a secret if you publish it on PyPI
Coinminer and npm: What you see is not always what you get
June 1, 2022

Coinminer and npm: What you see is not always what you get

Package repository content can be different from source code repository content. Here's what your software team needs to know.

Read More about Coinminer and npm: What you see is not always what you get
Coinminer and npm: What you see is not always what you get
Software supply chain risk demands our attention
June 1, 2022

Software supply chain risk demands our attention

Software supply chain attacks are a top concern. But tools for monitoring and stopping them lags. Meet ReversingLabs' new platform: secure.software.

Read More about Software supply chain risk demands our attention
Software supply chain risk demands our attention
Previous1...464748...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu