
Catching deceptive links before the click
Blog 1 of 5 part series on advanced research into modern phishing attacks
Read More about Catching deceptive links before the clickBlog 1 of 5 part series on advanced research into modern phishing attacks
Read More about Catching deceptive links before the clickRead More about 7 Common Mistakes to Avoid in Choosing a File Reputation Service
Malware is making it through your network. It's evading your organization's cyber defenses and impacting your business.
Read More about The Power of Automated Static AnalysisBlog 5: Subverting trust with digital counterfeits
Read More about Digital Certificates - Models for Trust and Targets for Misuse 5Blog 4: You are you, but so am I - certificate impersonation
Read More about Digital Certificates – Models for Trust and Targets for Misuse 4Tampering with signed objects without breaking the integrity seal
Read More about Digital Certificates – Models for Trust and Targets for Misuse 3Blog 2: Trust-based models in the age of supply chain attacks
Read More about Digital Certificates – Models for Trust and Targets for Misuse 2Blog 1: Building secure certificate whitelists
Read More about Digital Certificates – Models for Trust and Targets for Misuse 1Operation ShadowHammer is a new and highly targeted supply chain attack discovered by Kaspersky Lab.
Read More about Forging the ShadowHammerWe’ve seen some exciting customer results from our partnership with Tanium.
Read More about Customer Use Case: Combatting Undetected Malware with Tanium and ReversingLabsRead More about Machine Learning: A Belt and Suspenders Approach
On a recent customer visit, I asked the company’s Director of Security Operations how ReversingLabs came to be deployed as a part of their SOC tool set.
Read More about Notes from the Field: Extending Carbon Black Visibility to Undetected MalwareRead More about Join ReversingLabs at Alamo Ace in San Antonio, Texas, to See the Latest in Advanced Malware Hunting
Guest blog by Edvard Amoroso, Founder and CEO of TAG Cyber
Read More about Integrating Isolation with AnalyticsThe natural order of things is to evolve, so it was just a matter of time until obfuscations and variations would start appearing in the wild.
Read More about Three New DDE Obfuscation MethodsGet your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial