
Digital Certificates - Models for Trust and Targets for Misuse 5
Blog 5: Subverting trust with digital counterfeits

Blog 5: Subverting trust with digital counterfeits

Blog 4: You are you, but so am I - certificate impersonation

Tampering with signed objects without breaking the integrity seal

Blog 2: Trust-based models in the age of supply chain attacks

Blog 1: Building secure certificate whitelists

Operation ShadowHammer is a new and highly targeted supply chain attack discovered by Kaspersky Lab.

We’ve seen some exciting customer results from our partnership with Tanium.

On a recent customer visit, I asked the company’s Director of Security Operations how ReversingLabs came to be deployed as a part of their SOC tool set.


Guest blog by Edvard Amoroso, Founder and CEO of TAG Cyber

The natural order of things is to evolve, so it was just a matter of time until obfuscations and variations would start appearing in the wild.

At a recent FS-ISAC event, I listened to a cybersecurity analyst explain that a majority of the global (external) threat intelligence he receives is useless for his organization. “It just doesn’t apply to us,” he said, “and of the data that I think does apply, I have no fast and easy way to confirm that it does. It is still a lot of guesswork.”

Join ReversingLabs Research on a Threat Hunt for revoked D-Link certificates

Company’s are putting their data at risk by using VirusTotal, even when safer, superior options exist
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial