
Boost VM security: 8 key strategies
Virtual-machine ubiquity requires rethinking traditional AppSec controls — and modernizing your approach. Here are essential considerations.
Read More about Boost VM security: 8 key strategiesVirtual-machine ubiquity requires rethinking traditional AppSec controls — and modernizing your approach. Here are essential considerations.
Read More about Boost VM security: 8 key strategiesNew NIST guidance identifies ML challenges. Here’s why ReversingLabs Spectra Assure should be an essential part of your solution.
Read More about NIST Adversarial ML Guidance: How RL Can Secure Your OrganizationRL researchers detected a sophisticated, malicious package believed to be an ongoing campaign that may be linked to a hacktivist gang.
Read More about Backdoor implant discovered on PyPI posing as debugging utilityHere's why your organization should consider using SaaSBOMs, key challenges — and how to put CycloneDX's xBOM standard into action.
Read More about 5 reasons you need an SaaSBOMModel Context Protocol makes agentic AI development easier by connecting data sources — but the risks are very real. Here's what you need to know.
Read More about MCP is a powerful new AI coding technology: Understand the risksReversingLabs’ YARA detection rule for Conti can help you detect this ransomware in your environment. We provide tools and information that you can use to spot CONTI at work in your environment.
Read More about From the Labs: YARA Rule for Detecting ContiA new Python package revives the name of a malicious module to steal source code and secrets from blockchain developers’ machines.
Read More about Same name, different hack: PyPI package targets Solana developersMalicious instructions buried in LLM sources such as documents can poison ML models. Here's how it works — and how to protect your AI systems.
Read More about Indirect prompt injection attacks target common LLM data sourcesThe rapid rise of SaaS apps has spawned new risks. One new hopeful stands out: The SaaSBOM. Here are key steps that help rein them in.
Read More about SaaS risk is on the rise: 7 action items for better managementThe sequential Monte Carlo method guides LLMs to produce code that plays by basic programming rules. Here's what you need to know.
Read More about MIT researchers tame AI code with new controlsWithout modern application security tooling, including binary analysis, the third-party risk management puzzle is incomplete.
Read More about Mobile and third-party risk: How legacy testing leaves you exposedLeaks from GitHub and other repos are up, but collaboration tools such as Slack and Jira are now a major threat — and a serious blind spot.
Read More about Secrets leaks increase — and expand beyond the codebaseCycloneDX 1.6's ML-BOM, SaaSBOM, and CBOM are non-negotiable visibility requirements in the software supply chain security era.
Read More about Rise of the xBOM: The new go-to tool for software securityThe ML-BOM capability in RL's Spectra Assure SAFE Report provides immediate visibility into every ML model in your environment.
Read More about Secure Your AI Supply Chain with the ML-BOMUnderstand the difference between the SBOM and xBOM — and how it impacts software supply chain security.
Read More about What is the xBOM?Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial