
Digital Certificates - Models for Trust and Targets for Misuse 6
Blog 6: A new kind of certificate fraud: Executive impersonation

How Existing Cybersecurity Frameworks Can Curb Supply Chain Attacks
Implementing Processes and Controls to Disrupt Attackers

The NPM package that walked away with all your passwords
Detecting malware in package manager repositories

Highlights from Black Hat USA 2019
Last week the 22nd annual Black Hat conference hosted over 19,000 security professionals in Las Vegas.

Top Ways to Get More Value From Your EDR
Because of a critical lack of skilled security resources and because of an overload of potential cyberattack related events, efficient operations and accurate analysis are top of mind for savvy security teams everywhere.

How Detecting High Priority Malware will Accelerate Quality App Development and Release
...

What Are Supply Chain Attacks? How to Protect Your Software Lifecycle
Traditional supply chain attacks impact the production of physical goods. Your supply chain might include partners delivering raw materials, suppliers with component parts used in manufacturing, as well as trucks for distribution of finished goods.Disruption of that supply chain could result in production shutdowns, aging inventory, degraded partner relations, and financial loss.

The PDF invoice that phished you
Blog 5 of 5 part series on advanced research into modern phishing attacks

Catching lateral movement in internal emails
Blog 4 of 5 part series on advanced research into modern phishing attacks

Ransomware in exotic email attachments
Blog 3 of 5 part series on advanced research into modern phishing attacks

Automated Static Analysis vs. Dynamic Analysis - Better Together?
Cybercrime has been called "the greatest threat to every company in the world," and for good reason.

Visit ReversingLabs at Black Hat 2019
Introducing our Titanium Platform with Destructive Object Insights


