RL Blog
Malware in images graphic
March 2, 2021

Malware in images: When you can’t see 'the whole picture'

Read More about Malware in images: When you can’t see 'the whole picture'
Malware in images: When you can’t see 'the whole picture'
A1000 Version 6.0
February 22, 2021

A1000 Version 6.0

Our Most Significant Release Yet

Read More about A1000 Version 6.0
A1000 Version 6.0
Protecting Against Modern Software Risks
January 11, 2021

CISO’s Guide to Protecting Against Modern Software Risks

How to Rebuild Trust in the SDLC and 3rd Party Software Supply Chain

Read More about CISO’s Guide to Protecting Against Modern Software Risks
CISO’s Guide to Protecting Against Modern Software Risks
The attack on SolarWinds: Next-level stealth was key
December 16, 2020

The attack on SolarWinds: Next-level stealth was key

The SunBurst supply chain attack, which was behind the breach of SolarWinds, took sophistication and patience.

Read More about The attack on SolarWinds: Next-level stealth was key
The attack on SolarWinds: Next-level stealth was key
The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abused
December 15, 2020

The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abused

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond.

Read More about The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abused
The Week in Security: Wiper malware rains down on 2022, Microsoft certificates abused
Advancing the Cybersecurity Industry with the SOREL-20M Initiative
December 14, 2020

Advancing the Cybersecurity Industry with the SOREL-20M Initiative

ReversingLabs and Sophos partner to bring high-quality threat intelligence to security practitioners and data scientists

Read More about Advancing the Cybersecurity Industry with the SOREL-20M Initiative
Advancing the Cybersecurity Industry with the SOREL-20M Initiative
Rana Android Malware
December 7, 2020

Rana Android Malware

Your past catches up, sooner or later...

Read More about Rana Android Malware
Rana Android Malware
Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore
November 30, 2020

Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore

Learn more about our revised image modules

Read More about Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore
Platform Technology Updates: Better Malware Detection for Multiple Image Formats with TitaniumCore
PoorWeb - Hitching a Ride on Hangul
November 16, 2020

PoorWeb - Hitching a Ride on Hangul

Tearing Down HWP Files To Expose a Trojan

Read More about PoorWeb - Hitching a Ride on Hangul
PoorWeb - Hitching a Ride on Hangul
Taidoor - a truly persistent threat
September 22, 2020

Taidoor - a truly persistent threat

When malware lasts longer than your washing machine

Read More about Taidoor - a truly persistent threat
Taidoor - a truly persistent threat
Excel 4.0 Macros
September 8, 2020

Excel 4.0 Macros

The Risk of Hidden Threats in Compound Files

Read More about Excel 4.0 Macros
Excel 4.0 Macros
ransomware graphic
August 4, 2020

Machine Learning for Humans

Explainability. Transparency. Relevancy.

Read More about Machine Learning for Humans
Machine Learning for Humans
Five Uses of YARA
June 26, 2020

Five Uses of YARA

YARA is a useful member of the toolset of researchers, threat hunters, incident responder, and many other defenders.

Read More about Five Uses of YARA
Five Uses of YARA
whimsical abstract animated snakes
June 23, 2020

Hidden Cobra - from a shed skin to the viper’s nest

Enriching public threat intelligence

Read More about Hidden Cobra - from a shed skin to the viper’s nest
Hidden Cobra - from a shed skin to the viper’s nest
Retread Ransomware
June 5, 2020

Retread Ransomware

Identifying Satana to Understand "CoronaVirus"

Read More about Retread Ransomware
Retread Ransomware
Previous1...495051...55Next

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu