
Introducing Explainable Machine Learning
Next-generation machine learning algorithms built for humans

Reminiscence of the Flashback
macOS Blog 2 of 5: Mac Flashback malware remains relevant

Is Your macOS Safe from Attack - What 2019 has Shown Us
macOS Blog 1 of 5: Treat macOS like any other potentially vulnerable asset

When Malware RATs on their Owners
Uncovering configurations for malicious Remote Administration Tools

The Hunt for NTCrypt: Exposing a Malicious Packer
Researchers demonstrate how threat hunting with Titanium Platform accelerates their analysis

Going Behind the Scenes of Cybercrime Group FIN6’s Attack On Retail and Hospitality
See how ReversingLabs delivers the actionable insights needed for threat hunters to find attacks related to a FIN6 reverse shell

10 Billion Files Classified
Scaling Cybersecurity: How ReversingLabs Analyzed 10 Billion Files to Combat Emerging Threats

3 Ways High-Priority Malware Detection Can Fill SOC Gaps

Breaking the UEFI firmware Authenticode security model
Blog 8 in series: Digital Certificates - Models for Trust and Targets for Misuse

Breaking the Windows Authenticode security model
Blog 7 in series: Digital Certificates - Models for Trust and Targets for Misuse

Breaking the Linux Authenticode security model
Blog 9 in series: Digital Certificates - Models for Trust and Targets for Misuse

Breaking the Microsoft Authenticode security model
Rocking the foundations of a trust-based digital code signing system


